共 30 条
[1]
[Anonymous], 2014, J WIRELESS MOBILE NE
[2]
[Anonymous], 2005, Journal of AHIMA, V76, p64A
[3]
[Anonymous], ACM C COMP COMM SEC
[4]
[Anonymous], 2015, Journal of Wireless Mobile Networks, Ubiquitous Computing
[5]
[Anonymous], 1996, SECURE SCHEMES SECRE
[6]
[Anonymous], CCS07 P 14 ACM C
[7]
[Anonymous], LNCS
[8]
Ciphertext-policy attribute-based encryption
[J].
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2007,
:321-+
[9]
Boldyreva A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P417