共 27 条
- [1] [Anonymous], 2019, SOFT COMPUTING SIGNA, DOI DOI 10.1016/B978-0-12-813912-7.00012-0
- [3] Ciphertext-policy attribute-based encryption [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
- [4] Cheung L, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P456
- [5] Emura K, 2009, LECT NOTES COMPUT SC, V5451, P13, DOI 10.1007/978-3-642-00843-6_2
- [6] Ge Aijun, 2012, Information Security and Privacy. Proceedings 17th Australasian Conference, ACISP 2012, P336, DOI 10.1007/978-3-642-31448-3_25
- [7] Herranz J, 2010, LECT NOTES COMPUT SC, V6056, P19
- [8] Lai JZ, 2011, LECT NOTES COMPUT SC, V6672, P24, DOI 10.1007/978-3-642-21031-0_3
- [9] Lifeng AN, 2018, COMMUNICATIONS TECHN, V51, P156, DOI [10.3969/j.issn.1002-0802.2018.01.028, DOI 10.3969/J.ISSN.1002-0802.2018.01.028]