Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference26 articles.
1. Amit Sahai, Brent Waters, Fuzzy identity-based encryption, in: Advances in Cryptology—EUROCRYPT 2005, 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark, May 22–26, 2005, Proceedings, 2005, pp. 457–473.
2. Secure attribute-based systems;Pirretti,2006
3. Amos Fiat, Moni Naor, Broadcast encryption, in: Advances in Cryptology—CRYPTO’93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22–26, 1993, Proceedings, 1993, pp. 480–491.
4. Divertible protocols and atomic proxy cryptography;Blaze,1998
5. Improved proxy re-encryption schemes with applications to secure distributed storage;Ateniese;ACM Trans. Inf. Syst. Secur.,2006
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献