共 15 条
[1]
Ajitha P., 2014, J THEORETICAL APPL I, V68, P20
[2]
Ateniese G., 2006, ACM Transactions on Information and Systems Security, V9, P1, DOI 10.1145/1127345.1127346
[3]
Baek J., 2012, P IEEE INT C INT TEC, P668
[4]
Bartoli A, 2010, INT CONF SMART GRID, P333, DOI 10.1109/SMARTGRID.2010.5622063
[5]
Birman K. P., 2011, P WORKSH COMP NEEDS, P1
[6]
Bojkovic Z., 2012, P 11 INT C APPL COMP, P83
[7]
Boneh D., 2001, Advances in Cryptology - CRTPTO 2001. 21st Annual International Cryptology Conference, Proceedings (Lecture Notes in Computer Science Vol.2139), P213
[8]
Boyen Xavier, 2008, International Journal of Applied Cryptography, V1, P3, DOI 10.1504/IJACT.2008.017047
[9]
Chu C.-K., 2013, P 8 ACM SIGSAC S INF, P369