共 24 条
[1]
[Anonymous], 2003, P INT 2003 9 IFIP TC
[2]
Bellare M, 1996, LECT NOTES COMPUT SC, V1070, P399
[4]
Canetti Ran, 2012, Information Theoretic Security. Proceedings of the 6th International Conference, ICITS 2012, P37, DOI 10.1007/978-3-642-32284-6_3
[5]
Cox LP, 2007, MOBISYS '07: PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON MOBILE SYSTEMS, APPLICATIONS, AND SERVICES, P233
[8]
Duckham M, 2005, LECT NOTES COMPUT SC, V3468, P152
[9]
Duong-Hieu Phan, 2012, Information Security and Privacy. Proceedings 17th Australasian Conference, ACISP 2012, P308, DOI 10.1007/978-3-642-31448-3_23
[10]
Feige Uriel, 1997, P 29 ANN ACM S THEOR, V97, P506, DOI DOI 10.1145/258533.258644