共 21 条
[3]
Camenisch J, 2001, LECT NOTES COMPUT SC, V2045, P93
[4]
Camenisch J., 2002, CCS 02 P 9 ACM C COM, P21, DOI [10.1145/586110.586114, DOI 10.1145/586110.586114]
[5]
Cameron K., 2005, LAWS IDENTITY
[6]
Chadwick DW, 2009, LECT NOTES COMPUT SC, V5705, P96, DOI 10.1007/978-3-642-03829-7_3
[7]
Dorflinger T, 2010, SECRYPT 2010: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, P155
[8]
Enck W., 2011, ENCY CRYPTOGRAPHY SE, P34
[10]
Josang A., 2007, ACSW 07, V68, P143