共 50 条
- [41] Towards Provably Secure Encrypted Control Using Homomorphic Encryption [J]. 2022 IEEE 61ST CONFERENCE ON DECISION AND CONTROL (CDC), 2022, : 7740 - 7745
- [44] Provably secure and efficient escrowable public key encryption schemes [J]. Tongxin Xuebao/Journal on Communications, 2014, 35 (07): : 33 - 37
- [47] Study on role-based IT strategy implementation mechanism [J]. Proceedings of the 2005 International Conference on Management Science & Engineering (12th), Vols 1- 3, 2005, : 187 - 191
- [48] Auditing and Revocation Enabled Role-Based Access Control over Outsourced Private EHRs [J]. 2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 336 - 341
- [50] Provably secure group signature scheme with verifier-local revocation in the standard model [J]. Tien Tzu Hsueh Pao/Acta Electronica Sinica, 2011, 39 (07): : 1618 - 1623