共 40 条
[1]
Akinyele JosephA., 2011, P 1 ACM WORKSHOP SEC, P75, DOI DOI 10.1145/2046614.2046628
[2]
Alshehri S., 2012, Proceedings of the 2012 IEEE International Conference on Data Engineering Workshops (ICDEW 2012), P143, DOI 10.1109/ICDEW.2012.68
[3]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P223
[5]
Boyen X, 2003, LECT NOTES COMPUT SC, V2729, P383
[6]
Boyen X, 2010, INFORM SEC CRYPT TEX, P195, DOI 10.1007/978-3-540-89411-7_10
[7]
Cheng Chen, 2012, Provable Security. Proceedings of the 6th International Conference (ProvSec 2012), P53, DOI 10.1007/978-3-642-33272-2_5
[8]
Betrayal, Distrust, and Rationality: Smart Counter-Collusion Contracts for Verifiable Cloud Computing
[J].
CCS'17: PROCEEDINGS OF THE 2017 ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY,
2017,
:211-227
[9]
Hierarchical ID-based cryptography
[J].
ADVANCES IN CRYPTOLOGY - ASIACRYPT 2002, PROCEEDINGS,
2002, 2501
:548-566