共 17 条
- [2] [Anonymous], P 3 ACM INT WORKSH I
- [3] [Anonymous], 2009, TECHNICAL REPORT
- [4] [Anonymous], INT WORKSH SEC INT T
- [5] Ciphertext-policy attribute-based encryption [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
- [6] Broder Andrei, 2004, Internet mathematics, V1, P485, DOI DOI 10.1080/15427951.2004.10129096
- [7] Buneman P, 2000, LECT NOTES COMPUT SC, V1974, P87
- [9] Lineage tracing for general data warehouse transformations [J]. VLDB JOURNAL, 2003, 12 (01) : 41 - 58
- [10] Joyia G. J., 2017, J. Commun., V12, P240, DOI [DOI 10.12720/JCM.12.4.240-247, DOI 10.12720/JCM.12.4.240]