共 7 条
- [2] A Secure e-Health Architecture based on the Appliance of Pseudonymization[J] . Bernhard Riedl,Veronika Grascher,Thomas Neubauer.Journal of Software . 2008 (2)
- [3] Delegatable Homomorphic Encryption with Ap-plications to Secure Outsourcing of Computation .2 Manuel Barbosa,Pooya Farshim. CT-RSA . 2012
- [4] A privacy preserving authentication framework for safety messages in VANET .2 Jinila Y B,Komathy K. Proc of SEISCON 2013 . 2013
- [5] Attribute-Based encryption for fine-grained access control of encrypted data .2 Goyal V,Pandey O,Sahai A,Waters B. Proc.ofthe 13th ACM Conf.on Computer and Communications Security . 2006
- [6] A Key-Management Scheme for Distributed Sensor Networks .2 L Eschenauer,V Gligor. The ACM Conference on Computer and Communications Security . 2002
- [7] Pseudo trust: Zero-knowledge authentication in anonymous P2Ps .2 Lu,Li,Han,Jinsong,Liu,Yunhao,Hu,Lei,Huai,Jin-Peng,Ni,Lionel,Ma,Jian. IEEE Transactions on Parallel and Distributed Systems . 2008