Author:
Au Man Ho,Wu Qianhong,Susilo Willy,Mu Yi
Publisher
Springer Berlin Heidelberg
Reference13 articles.
1. Ateniese, G., Camenisch, J., de Medeiros, B.: Untraceable rfid tags via insubvertible encryption. In: ACM Conference on Computer and Communications Security, pp. 92–101 (2005)
2. Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved proxy re-encryption schemes with applications to secure distributed storage. In: NDSS (2005)
3. Lecture Notes in Computer Science;S. Brands,1994
4. Brickell, E., Gemmell, P., Kravitz, D.: Trustee-based Tracing Extensions to Anonymous Cash and the Making of Anonymous Change. In: SODA 1995. Proceedings of the Sixth Annual ACM-SIAM Symposium on Discrete Algorithms, pp. 457–466. Society for Industrial and Applied Mathematics (1995)
5. Lecture Notes in Computer Science;J. Camenisch,2005
Cited by
21 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献