共 21 条
[1]
AKERS SB, 1978, IEEE T COMPUT, V27, P509, DOI 10.1109/TC.1978.1675141
[2]
[Anonymous], INF SCI
[3]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[4]
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
[5]
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[7]
Drechsler R., 2001, International Journal on Software Tools for Technology Transfer, V3, P112, DOI 10.1007/s1O0090100056
[8]
Goyal V., 2006, P 2006 INT C PRIVACY, P1
[9]
Li J., 2011, P 6 ACM S INF COMP C, P386
[10]
Li Jiguo., 2017, IEEE T SERV COMPUT, V10, P785, DOI [DOI 10.1007/S10753-016-0405-4, DOI 10.1109/TSC.2016.2520932, DOI 10.1109/TSC.2016.2542813]