共 18 条
[2]
Bagherzandi A, 2011, PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), P433
[3]
Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
[4]
Benaloh Cohen, 1986, CRYPTO P CRYPT
[5]
Brickell E., 2004, P ACM C COMP COMM SE, P132, DOI DOI 10.1109/TSC.2010.60
[6]
Chen LQ, 2008, LECT NOTES COMPUT SC, V5222, P31, DOI 10.1007/978-3-540-85886-7_3
[7]
Gennaro R, 1996, LECT NOTES COMPUT SC, V1070, P354
[8]
Hoare C. A. R., 1985, Communicating Sequential Processes.
[9]
Iftene S., 2006, SCI ANN CUZA U, V16, P63
[10]
Kaya K, 2008, LECT NOTES COMPUT SC, V5023, P94