共 50 条
- [31] Hierarchical Key Assignment Schemes with Key Rotation [J]. PROCEEDINGS OF THE 29TH ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES, SACMAT 2024, 2024, : 171 - 182
- [32] An Efficient and Provably-Secure Coercion-Resistant E-Voting Protocol [J]. 2013 ELEVENTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2013, : 161 - 168
- [33] Provably-secure programming languages for remote evaluation [J]. ACM SIGPLAN NOTICES, 1997, 32 (01) : 117 - 119
- [35] An efficient, provably-secure DAG based consensus mechanism for industrial internet of things [J]. INTERNATIONAL JOURNAL OF INTERACTIVE DESIGN AND MANUFACTURING - IJIDEM, 2023, 17 (05): : 2197 - 2207
- [38] An Efficient and Provably-Secure Identity-based Signcryption Scheme for Multiple PKGs [J]. PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY, 2008, : 189 - 193
- [39] Verifiable Hierarchical Key Assignment Schemes [J]. DATA AND APPLICATIONS SECURITY AND PRIVACY XXXV, 2021, 12840 : 357 - 376
- [40] A secure and efficient time-bound hierarchical key assignment scheme [J]. IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 371 - +