1. Lecture Notes in Computer Science;M. Barbosa,2007
2. Lecture Notes in Computer Science;M. Bellare,2003
3. Lecture Notes in Computer Science;D. Boneh,2005
4. Boyen, X., Mei, Q., Waters, B.: Direct chosen ciphertext security from identity-based techniques. In: Atluri, V., Meadows, C., Juels, A. (eds.) ACM Conference on Computer and Communications Security, pp. 320–329. ACM, New York (2005)
5. Lecture Notes in Computer Science;D. Cash,2008