1. Lecture Notes in Computer Science;M. Abdalla,2005
2. Ateniese, G., Camenisch, J., de Medeiros, B.: Untraceable RFID Tags via Insubvertible Encryption. In: CCS 2005: Proceedings of the 12th ACM conference on Computer and communications security, pp. 92–101. ACM, New York (2005)
3. Ballard, L., Green, M., de Medeiros, B., Monrose, F.: Correlation-Resistant Storage via KeywordSearchable Encryption. In: Cryptology ePrint Archive, Report 2005/417 (2005),
http://eprint.iacr.org/2005/417
4. Lecture Notes in Computer Science;M. Bellare,2001
5. Bentahar, K., Farshim, P., Malone-Lee, J., Smart, N.: Generic Constructions of Identity-Based and Certificateless KEMs. In: Cryptology ePrint Archive, Report 2005/058 (2005),
http://eprint.iacr.org/2005/058