共 39 条
- [1] Amounas F(2012)ECC encryption and decryption with a data sequence Appl Math Sci 6 5039-5047
- [2] El Kinani E(2016)A trusted user-to-role and role-to-key access control scheme Soft Comput 20 1721-1733
- [3] Chen HC(1996)Location-based authentication: grounding cyberspace for better security Comput Fraud Secur 2 12-16
- [4] Denning DE(1985)A randomized protocol for signing contracts Commun ACM 28 637-647
- [5] MacDoran PF(2009)A proof of security of Yaos protocol for two-party computation J Cryptol 22 161-188
- [6] Even S(2012)Becan: a bandwidth-efficient cooperative authentication scheme for filtering injected false data in wireless sensor networks IEEE Trans Parallel Distrib Syst 23 32-43
- [7] Goldreich O(2010)Privacy-aware role-based access control ACM Trans Inf Syst Secur TISSEC 13 24-592
- [8] Lempel A(2005)How to exchange secrets with oblivious transfer IACR Cryptol ePrint Arch 2005 187-65
- [9] Lindell Y(2016)Quantum cryptographic approach to decentralized access control and privacy preserving in cloud Asian J Inf Technol 15 578-1533
- [10] Pinkas B(2016)Garbled computation in cloud Future Gener Comput Syst 62 54-2395