共 15 条
[1]
Alam K. M. R., 2010, IEEJ T EIS, V130, P2065
[2]
AlSammak A., 2015, Adv. Comput. Sci., Int. J., V4, P98
[3]
[Anonymous], 2015, ACM SIGLOG News, DOI [DOI 10.1145/2728816.2728823, 10.1145/2728816.2728823]
[4]
Childs LN, 2009, A concrete introduction to higher algebra
[5]
Hirt M, 2000, LECT NOTES COMPUT SC, V1807, P539
[6]
Commutative Re-encryption Techniques: Significance and Analysis
[J].
INFORMATION SECURITY JOURNAL,
2015, 24 (4-6)
:185-193
[7]
Islam N, 2013, COMPUT FRAUD SECUR, P9, DOI 10.1016/S1361-3723(13)70111-8
[8]
Li Huian, 2014, COMP COMM NETW ICCN
[9]
Rana A, 2015, PROCEEDINGS OF THE 14TH EUROPEAN CONFERENCE ON CYBER WARFARE AND SECURITY (ECCWS-2015), P229