共 44 条
- [1] [Anonymous], IACR CRYPTOL
- [2] [Anonymous], 2009, INT J VOMMUNICATION
- [3] [Anonymous], J U ELECT SCI TECHNO
- [4] Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
- [5] Ciphertext-policy attribute-based encryption [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
- [6] Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
- [7] Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
- [8] Butun I., 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC 2011), P1118, DOI 10.1109/CCNC.2011.5766345
- [9] Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
- [10] Chatterjee S, 2014, 2014 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI), P2074, DOI 10.1109/ICACCI.2014.6968242