共 31 条
[1]
[Anonymous], P1363 IEEE
[2]
Ateniese G., 2004, ACM Transactions on Information and Systems Security, V7, P1, DOI 10.1145/984334.984335
[3]
Ateniese G, 1999, 6TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P138, DOI 10.1145/319709.319728
[4]
Bellare M., 1993, P 1 ACM C COMPUTER C, P62
[6]
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[7]
Boneh D., 2001, P 7 INT C THEOR APPL, P514, DOI [DOI 10.1007/S00145-004-0314-9, 10.1007/s00145-004-0314-9]
[8]
Boneh D, 2006, LECT NOTES COMPUT SC, V3958, P229
[9]
Cathalo J, 2004, LECT NOTES COMPUT SC, V3225, P52
[10]
Dodis Y., 2003, P ACM WORKSH DIG RIG, P47