Author:
Dubovitskaya Alevtina,Urovi Visara,Vasirani Matteo,Aberer Karl,Schumacher Michael I.
Publisher
Springer International Publishing
Reference27 articles.
1. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)
2. Baig, M.M., Li, J., Liu, J., Wang, H.: Cloning for privacy protection in multiple independent data publications. In: Proceedings of the 20th ACM International Conference on Information and knowledge Management, CIKM 2011, p. 885 (2011)
3. Benoist, E., Sliwa, J.: How to Collect Consent for an Anonymous Medical Database. HEALTHINF (2014)
4. Blake, I., Seroussi, G., Smart, N., Cassels, J.W.S.: Advances in Elliptic Curve Cryptography. Cambridge University Press, New York (2005)
5. Lecture Notes in Computer Science;D Boneh,2004
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献