共 50 条
- [1] Traceable Hierarchical Attribute-based Authentication for the Cloud [J]. 2015 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2015, : 685 - 689
- [2] Efficient Traceable Attribute-Based Signature [J]. 2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 582 - 589
- [3] A Dynamic Attribute-Based Authentication Scheme [J]. CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 106 - 118
- [5] Traceable attribute-based signcryption [J]. SECURITY AND COMMUNICATION NETWORKS, 2014, 7 (12) : 2302 - 2317
- [6] Traceable Outsourcing Attribute-Based Encryption with Attribute Revocation [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2019, 56 (10): : 2160 - 2169
- [7] Traceable and Weighted Attribute-Based Encryption Scheme in the Cloud Environment [J]. IEEE ACCESS, 2020, 8 : 38285 - 38295
- [9] A Multi Sender Attribute-Based Broadcast Authentication Scheme [J]. 2016 8TH INTERNATIONAL SYMPOSIUM ON TELECOMMUNICATIONS (IST), 2016, : 78 - 83
- [10] An Efficient Attribute-Based Ring Signature Scheme [J]. 2009 INTERNATIONAL FORUM ON COMPUTER SCIENCE-TECHNOLOGY AND APPLICATIONS, VOL 1, PROCEEDINGS, 2009, : 147 - 150