共 11 条
[1]
Identity-based encryption from the Weil pairing. Boneh D,Franklin M. Proceeding of Advances in Cryptology-Crypto’2001 . 2001
[2]
SiRiUS:securing remote untrusted storage. GOH E-J,SHACHAM H,MODADUGU N,et al. Proceedings of the 2003 Symposium on Network and Distributed Systems Security . 2003
[3]
CRUST: cryptographic remote untrusted storage without public keys[J] . Erel Geron,Avishai Wool.  International Journal of Information Security . 2009 (5)
[4]
SAPDS: self-healing attribute-based privacy aware data sharing in cloud[J] . Zeeshan Pervez,Asad Khattak,Sungyoung Lee,Young-Koo Lee.  The Journal of Supercomputing . 2012 (1)
[6]
Ciphertext-policy attribute-based encryption. Bethencourt J,Sahai A,Waters B. Proceedings of the2007IEEE Symposium on Security and Privacy . 2007
[7]
Lazy Revocation in Cryptographic File Systems. Michael Backes, Christian Cachin, Alina Oprea. Proceedings of the Third IEEE International Security in Storage Workshop . 2005
[8]
Fuzzy identity-based encryption. Sahai A,Waters B. Advances in cryptology-eurocrypt 2005 . 2005
[9]
Key regression:enabling efficient key distribution for secure distributed storage. FU K,KAMARA S,KOHNO T. Proceedings of the 2006 Symposium on Network and Distributed Systems Security . 2006
[10]
Patient controlled encryption:ensuring privacy of electronic medical records. BENALOH J,CHASE M,HORVITZ E,et al. Proceedings of the 2009 ACM Workshop on Cloud Computing Security . 2009