共 30 条
[21]
Lynn B., The Pairing -Based Cryptography Library
[22]
Methods and limitations of security policy reconciliation
[J].
2002 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2002,
:73-87
[23]
Pirretti M., 2006, ACM C COMP COMM SEC
[24]
Fuzzy identity-based encryption
[J].
ADVANCES IN CRYPTOLOGY - EUROCRYPT 2005,PROCEEDINGS,
2005, 3494
:457-473
[27]
Shamir A., 1984, LNCS, V196, P37
[28]
Smart NP, 2003, LECT NOTES COMPUT SC, V2612, P111
[29]
A unified scheme for resource protection in automated trust negotiation
[J].
2003 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS,
2003,
:110-122
[30]
Zippel R., 1979, LECT NOTES COMPUTER, V72, P216, DOI DOI 10.1007/3-540-09519-5_73