共 15 条
[1]
[Anonymous], 2002, FEDERAL INFORM PROCE, V180-2
[2]
[Anonymous], 1997, HMAC KEYED HASHING M
[3]
[Anonymous], STORAGESS
[4]
[Anonymous], CRYPT 5 6 0 BENCHM
[5]
Ateniese G, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P598
[6]
Bowers KD, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P187
[7]
Cachin Christian, 2009, SIGACT News, V40, P81, DOI 10.1145/1556154.1556173
[8]
Chang EC, 2008, LECT NOTES COMPUT SC, V5283, P223
[9]
Hayes B, 2008, COMMUN ACM, V51, P9, DOI [10.1145/1364782.1364786, 10.1145/1364782.1364789]
[10]
Juels A, 2007, CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P584