共 15 条
[2]
Alur R., 1999, LECT NOTES COMPUTER, V15, P7
[4]
Bhargava Mohit, 2005, P CONCUR 20 IN PRESS
[5]
Bianco A., 1995, LNCS, V1026, P499, DOI DOI 10.1007/3-540-60692-0
[6]
Chaum D., 1988, Journal of Cryptology, V1, P65, DOI 10.1007/BF00206326
[7]
Anonymity and information hiding in multiagent systems
[J].
16TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, PROCEEDINGS,
2003,
:75-88
[8]
Hansson H., 1994, Formal Aspects of Computing, V6, P512, DOI 10.1007/BF01211866
[9]
KESDOGAN D, 1998, LNCS, V1525
[10]
Kwiatkowska M, 2002, LECT NOTES COMPUT SC, V2324, P200