共 32 条
[1]
Abe M., 1996, Advances in Cryptology - ASIACRYPT'96 International Conference on the Theory and Applications of Cryptology and Information Security. Proceedings, P244, DOI 10.1007/BFb0034851
[2]
Abe M, 2000, LECT NOTES COMPUT SC, V1880, P271
[3]
[Anonymous], 2010, P IEEE INFOCOM
[4]
[Anonymous], 2011, P 5 INT ICST C PERV
[5]
[Anonymous], ACM SENSYS
[6]
Chaum D., 1983, Advances in Cryptology, Proceedings of Crypto 82, P199
[7]
Chaum David., 1982, ADV CRYPTOLOGY
[8]
Christin D, 2012, INT CONF PERVAS COMP, P135, DOI 10.1109/PerCom.2012.6199860
[9]
Cornelius C, 2008, MOBISYS'08: PROCEEDINGS OF THE SIXTH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P211
[10]
Cristofaro E. D., 2011, P ACM WISEC