共 16 条
- [1] Ateniese G, 2000, LECT NOTES COMPUT SC, V1880, P255
- [2] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P56
- [3] Brands S. A., 1993, CSR9323 CTR WISK INF
- [4] Camenisch J., 1996, Computer Security-ESORICS 96. 4th European Symposium on Research in Computer Security Proceedings, P33
- [5] Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
- [6] Chaum D, 1988, Conference on the Theory and Application of Cryptography, P319
- [9] Cong Wang, 2013, 2013 Fifth International Conference on Computational and Information Sciences (ICCIS 2013), P438, DOI 10.1109/ICCIS.2013.122