共 17 条
- [1] [Anonymous], 2010, INFOCOM, 2010 Proceedings IEEE, DOI DOI 10.1109/INFCOM.2010.5462196
- [2] Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
- [3] Blaze M, 1998, LECT NOTES COMPUT SC, V1403, P127, DOI 10.1007/BFb0054122
- [4] Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
- [5] Canetti R, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P185
- [6] Chu CK, 2007, LECT NOTES COMPUT SC, V4779, P189
- [7] Hierarchical conditional proxy re-encryption [J]. COMPUTER STANDARDS & INTERFACES, 2012, 34 (04) : 380 - 389
- [8] Green M, 2007, LECT NOTES COMPUT SC, V4521, P288
- [9] A Searchable Hierarchical Conditional Proxy Re-Encryption Scheme for Cloud Storage Services [J]. INFORMATION TECHNOLOGY AND CONTROL, 2016, 45 (03): : 289 - 299
- [10] Libert B, 2008, LECT NOTES COMPUT SC, V4939, P360, DOI 10.1007/978-3-540-78440-1_21