共 24 条
[2]
Bellare M, 2006, LNCS, V1070, P399
[3]
Boldyreva A., SECURE PROXY SIGNATU
[4]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[6]
Canetti R., 1998, Proceedings of the Thirtieth Annual ACM Symposium on Theory of Computing, P209, DOI 10.1145/276698.276741
[7]
Huang PH, 2007, INFORMATICA-LITHUAN, V18, P55
[8]
Huang XY, 2006, LECT NOTES COMPUT SC, V4325, P473
[9]
Huang XY, 2005, LECT NOTES COMPUT SC, V3823, P480
[10]
Kim S., 1997, Information and Communications Security. First International Conference, ICIS '97. Proceedings, P223, DOI 10.1007/BFb0028478