共 23 条
[1]
Agrawal S, 2010, LECT NOTES COMPUT SC, V6223, P98, DOI 10.1007/978-3-642-14623-7_6
[2]
Ajtai M., 1996, Proceedings of the Twenty-Eighth Annual ACM Symposium on the Theory of Computing, P99, DOI 10.1145/237814.237838
[3]
[Anonymous], 2000, P INT C CHIN LANG CO
[4]
Awasthi AmitK., 2005, T CRYPTOLOGY, V2, P5
[5]
Cash D, 2010, LECT NOTES COMPUT SC, V6110, P523
[6]
Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
[7]
Dong Z, 2004, 18TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOL 2 (REGULAR PAPERS), PROCEEDINGS, P380
[8]
Gentry C, 2008, ACM S THEORY COMPUT, P197
[9]
Gordon SD, 2010, LECT NOTES COMPUT SC, V6477, P395, DOI 10.1007/978-3-642-17373-8_23
[10]
Lang W., 2004, ASIAN J INFORM TECHN, V3, P839