Author:
Aono Yoshinori,Boyen Xavier,Phong Le Trieu,Wang Lihua
Publisher
Springer International Publishing
Reference35 articles.
1. Lecture Notes in Computer Science;B. Applebaum,2009
2. Ateniese, G., Benson, K., Hohenberger, S.: Key-private proxy re-encryption. In: Fischlin, M. (ed.) CT-RSA 2009. LNCS, vol. 5473, pp. 279–294. Springer, Heidelberg (2009), Full version at
http://eprint.iacr.org/2008/463
3. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. ACM Trans. Inf. Syst. Secur. 9(1), 1–30 (2006)
4. Banaszczyk, W.: New bounds in some transference theorems in the geometry of numbers. Mathematische Annalen 296(1), 625–635 (1993)
5. Banaszczyk, W.: Inequalities for convex bodies and polar reciprocal lattices in ℝ
n
. Discrete & Computational Geometry 13(1), 217–231 (1995)
Cited by
74 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献