共 11 条
- [1] Anderson PO, 2010, PHARMACY INFORMATICS, P1, DOI 10.1145/1852658.1852665
- [2] [Anonymous], 2012, NISTS POLICY HASH FU
- [3] Armbrust M., 2009, Technical Report No. UCB/EECS-2009-28, P1
- [4] Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
- [5] Bellare M., 2012, P IACR CRYPT EPRINT
- [6] Blakley C., 1985, Advances in Cryptology, P242
- [7] Bowers KevinD., 2009, Proc. of ACM-CCSW '09, P43, DOI DOI 10.1145/1655008.1655015
- [8] Dodis Y, 2009, LECT NOTES COMPUT SC, V5444, P109
- [9] Erway CC, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P213
- [10] Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584