共 9 条
[1]
[Anonymous], 2015, CRYPTOGRAPHIC PROTEC
[2]
[Anonymous], 2013, EXTENSIBLE ACC CONTR
[3]
Horváth M, 2015, LECT NOTES COMPUT SC, V8939, P566, DOI 10.1007/978-3-662-46078-8_47
[4]
Lewko AllisonB., 2011, Decentralizing Attribute-Based Encryption, P568, DOI DOI 10.1007/978-3-642-20465-4_31
[5]
McConaghy T., 2016, BIGCHAINDB WHITEPAPE
[6]
Poddar R., 2016, CRYPTOLOGY EPRINT AR, V2016, P591
[7]
Popa RA, 2011, SOSP 11: PROCEEDINGS OF THE TWENTY-THIRD ACM SYMPOSIUM ON OPERATING SYSTEMS PRINCIPLES, P85
[8]
Sukhodolskiy IA, 2017, IEEE NW RUSS YOUNG, P578, DOI 10.1109/EIConRus.2017.7910620
[9]
Yuan W., 2016, IACR Cryptology ePrint Archive, V2016, P457