共 44 条
[1]
[Anonymous], 2008, P 4 INT C SEC PRIV C, DOI 10.1145/1460877.1460889
[2]
Apon D., 2014, IACR Cryptology ePrint Archive
[3]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[4]
Barak B., 2001, Proceedings of the 21st Annual International Cryptology Conference, Santa Barbara, California, V2139, P1
[6]
Baum Carsten, 2014, Security and Cryptography for Networks. 9th International Conference (SCN 2014). Proceedings: LNCS 8642, P175, DOI 10.1007/978-3-319-10879-7_11
[7]
Boneh D., 2001, LNCS, V2248, P514, DOI DOI 10.1007/3-540-45682-1_30
[8]
Multiparty Key Exchange, Efficient Traitor Tracing, and More from Indistinguishability Obfuscation
[J].
ADVANCES IN CRYPTOLOGY - CRYPTO 2014, PT I,
2014, 8616
:480-499
[9]
Cash D, 2013, LECT NOTES COMPUT SC, V7881, P279, DOI 10.1007/978-3-642-38348-9_17
[10]
QuickSync: Improving Synchronization Efficiency for Mobile Cloud Storage Services
[J].
MOBICOM '15: PROCEEDINGS OF THE 21ST ANNUAL INTERNATIONAL CONFERENCE ON MOBILE COMPUTING AND NETWORKING,
2015,
:592-603