Funder
National Key Basic Research Program (973 program)
National Natural Science Foundation of China (CN)
Natural Science Foundation of Jilin Province (CN)
Natural Science Foundation of China
Beijing Natural Science Foundation
Research Funds of Renmin University of China
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Safety, Risk, Reliability and Quality,Information Systems,Software
Reference22 articles.
1. Abdalla, M., Dent, A.W., Malone-Lee, J., Neven, G., Phan, D.H., Smart, N.P.: Identity-based traitor tracing. In: Proceeding of the Public Key Cryptography-PKC 2007, pp. 361–376. Beijing, China (2007)
2. Boneh, D., Naor, M.: Traitor tracing with constant size ciphertext. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 501–510. Alexandria, USA (2008)
3. Deng, H., Wu, Q., Qin, B., Chow, S.S.M., Domingo-Ferrer, J., Shi, W.: Tracing and revoking leaked credentials: accountability in leaking sensitive outsourced data. In: Proceedings of the ACM Symposium on Information, Computer and Communications Security (ASIACCS 2014), pp. 425–434. Kyoto, Japan (2014)
4. Deng, H., Wu, Q., Qin, B., Liu, J., Mao, J.: Securely selling TV programs to chained hotels: leakage traceable hierarchical key distribution. In: Proceedings of the 2014 Communications Security Conference (CSC 2014), pp. 156–161. IET Press, Beijing, China (2014)
5. Fatemi, M., Salimi, S., Salahi, A.: Anonymous roaming in universal mobile telecommunication system mobile networks. IET Inf. Secur. 4(2), 93–103 (2010)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献