共 29 条
[2]
[Anonymous], 2002, INTRO CRYPTOGRAPHY P
[3]
[Anonymous], 2016, EVID BASED COMPLEMEN
[4]
[Anonymous], 2016, P INT C REC COGN WIR
[5]
[Anonymous], 2009, NATL I STAND TECHNOL, DOI DOI 10.6028/NIST.SP.800-145
[6]
Badve OP, 2015, 2015 IEEE 4TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS (GCCE), P584, DOI 10.1109/GCCE.2015.7398603
[7]
Barni M, 2010, MM&SEC 2010: 2010 ACM SIGMM MULTIMEDIA AND SECURITY WORKSHOP, PROCEEDINGS, P231
[8]
Blanton M, 2011, LECT NOTES COMPUT SC, V6879, P190, DOI 10.1007/978-3-642-23822-2_11
[10]
Privacy-Preserving Query over Encrypted Graph-Structured Data in Cloud Computing
[J].
31ST INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS (ICDCS 2011),
2011,
:393-402