共 38 条
[1]
[Anonymous], 2016, NIST SPEC PUBL
[2]
[Anonymous], 2002, LNCS
[3]
[Anonymous], 2002, P 9 ACM C COMPUTER C
[4]
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[5]
Ateniese G., 2010, INTERNET SOC, V104, DOI [10.1007/978-3-642-13708-2_6, DOI 10.1007/978-3-642-13708-2_6]
[6]
Ateniese G, 2009, LECT NOTES COMPUT SC, V5473, P279, DOI 10.1007/978-3-642-00862-7_19
[8]
Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
[9]
Boneh D, 2011, LECT NOTES COMPUT SC, V6597, P253, DOI 10.1007/978-3-642-19571-6_16
[10]
Brzuska C, 2010, LECT NOTES COMPUT SC, V6123, P87, DOI 10.1007/978-3-642-13708-2_6