共 12 条
[1]
Al-Riyami SS, 2003, LECT NOTES COMPUT SC, V2894, P452
[2]
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417
[3]
Chu CK, 2007, LECT NOTES COMPUT SC, V4779, P189
[4]
Green M, 2007, LECT NOTES COMPUT SC, V4521, P288
[5]
Identity-based data storage in cloud computing
[J].
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE,
2013, 29 (03)
:673-681
[6]
Liang K, 2014, LECT NOTES COMPUT SC, V8712, P257, DOI 10.1007/978-3-319-11203-9_15
[7]
Matsuo T, 2007, LECT NOTES COMPUT SC, V4575, P247
[8]
Seo JH, 2013, LECT NOTES COMPUT SC, V7778, P216, DOI 10.1007/978-3-642-36362-7_14
[9]
Shamir A., 1985, ADV CRYPTOLOGY, P47, DOI 10.1007/3-540-39568-7_5
[10]
Tang Q, 2009, LECT NOTES COMPUT SC, V5487, P332, DOI 10.1007/978-3-642-01440-6_26