共 18 条
- [1] Ciphertext-policy attribute-based encryption [J]. 2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, : 321 - +
- [2] Chow S. S. M., 2011, P 6 ACM S INF COMP C, P52, DOI [10.1145/1966913.1966922, DOI 10.1145/1966913.1966922]
- [3] Even S, 1989, P C THEOR APPL CRYPT, V435, P263, DOI DOI 10.1007/0-387-34805-0_24
- [5] Goyal V., 2006, ACM CCS 2006, P89
- [6] Green M., 2011, PROC 20 USENIX SECUR
- [7] Guo FC, 2008, LECT NOTES COMPUT SC, V5143, P247
- [8] Hohenberger S, 2014, LECT NOTES COMPUT SC, V8383, P293, DOI 10.1007/978-3-642-54631-0_17
- [9] Fog computing security: a review of current applications and security solutions [J]. JOURNAL OF CLOUD COMPUTING-ADVANCES SYSTEMS AND APPLICATIONS, 2017, 6