共 41 条
[1]
[Anonymous], 2017, IEEE T DEPENDABLE SE
[3]
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5921, P278, DOI 10.1007/978-3-642-10868-6_17
[4]
Attrapadung N, 2009, LECT NOTES COMPUT SC, V5671, P248, DOI 10.1007/978-3-642-03298-1_16
[5]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[6]
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[7]
Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
[8]
Chia-Chi Teng, 2010, 2010 IEEE International Conference on Software Engineering and Service Sciences (ICSESS 2010), P431, DOI 10.1109/ICSESS.2010.5552343
[10]
Emura K, 2009, LECT NOTES COMPUT SC, V5451, P13, DOI 10.1007/978-3-642-00843-6_2