共 60 条
[1]
Abadi M, 2013, LECT NOTES COMPUT SC, V8042, P374, DOI 10.1007/978-3-642-40041-4_21
[2]
sp-AELM: Sponge Based Authenticated Encryption Scheme for Memory Constrained Devices
[J].
INFORMATION SECURITY AND PRIVACY (ACISP 2015),
2015, 9144
:451-468
[3]
CRYPTOGRAPHIC SOLUTION TO A PROBLEM OF ACCESS-CONTROL IN A HIERARCHY
[J].
ACM TRANSACTIONS ON COMPUTER SYSTEMS,
1983, 1 (03)
:239-248
[4]
Alizadeh Javad, 2015, ARTEMIA, V1
[5]
Andreeva E., 2014, LNCS, V8540, P168
[6]
Atallah MJ, 2007, LECT NOTES COMPUT SC, V4734, P515
[8]
ATALLAH MJ, 2005, P 12 ACM C COMP COMM, P190, DOI DOI 10.1016/J.IPL.2007.08.017]
[9]
ATENIESE G, 2006, P 13 ACM C COMP COMM, P288