共 35 条
[1]
[Anonymous], CONVERSATIONS INTERN
[3]
Beimel A., 1996, Secure schemes for secret sharing and key distribution
[4]
Benaloh Josh., 2009, P 2009 ACM WORKSHOP, P103
[5]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[6]
Boneh D, 2004, LECT NOTES COMPUT SC, V3027, P506
[7]
Chase M, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P121
[8]
Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
[9]
di Vimercati S.D. C., 2007, P 33 INT C VERY LARG, P123
[10]
Dong W, 2011, IEEE INFOCOM SER, P1647, DOI 10.1109/INFCOM.2011.5934958