共 30 条
- [1] [Anonymous], USENIX SECURITY
- [2] [Anonymous], A MEND WORKSH FDN DA
- [3] Bao F, 2003, LECT NOTES COMPUT SC, V2836, P301
- [4] Bellare M., 1997, Advances in Cryptology - EUROCRYPT '97. International Conference on the Theory and Application of Cryptographic Techniques Proceedings, P163
- [5] Benabbas S, 2011, LECT NOTES COMPUT SC, V6841, P111, DOI 10.1007/978-3-642-22792-9_7
- [6] Benaloh J., 1994, Lecture Notes in Computer Science 765: Advances in Cryptology (EUROCRYPT'93), P274
- [7] Boneh D, 2005, LECT NOTES COMPUT SC, V3621, P258
- [8] Camenisch J, 2002, LECT NOTES COMPUT SC, V2442, P61
- [9] Camenisch J, 2009, LECT NOTES COMPUT SC, V5443, P481
- [10] Catalano D., 2011, CRYPTOLOGY EPRINT AR