共 13 条
- [1] [Anonymous], 2000, P 7 ACM C COMPUTER C, DOI DOI 10.1145/352600.352638
- [3] Ateniese G., 1998, 5th ACM Conference on Computer and Communications Security, P17, DOI 10.1145/288090.288097
- [4] Ateniese G., 2001, IEEE J SEL AREA COMM, V8, P628
- [5] Becker K., 1998, 5th ACM Conference on Computer and Communications Security, P1, DOI 10.1145/288090.288094
- [6] Bellovin S. M., 1992, Proceedings. 1992 IEEE Computer Society Symposium on Research in Security and Privacy (Cat. No.92CH3157-5), P72, DOI 10.1109/RISP.1992.213269
- [7] NEW DIRECTIONS IN CRYPTOGRAPHY [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1976, 22 (06) : 644 - 654
- [8] A simple XOR-based technique for distributing group key in secure multicasting [J]. ISCC 2000: FIFTH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, PROCEEDINGS, 2000, : 166 - 171
- [9] Maki S., 2000, 007 HELS U TECHN LAB
- [10] Menezes A., 1997, HDB APPL CRYPTOGRAPH