Funder
National Natural Science Foundation of China
Jiangsu Provincial Natural Science Foundation
Jiangsu Higher Education Institutions
Central Universities
Jiangsu Key Laboratory
NJUPT
Foundation of Suqian College
Jiangsu Innovation Program
Qing Lan Project
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference50 articles.
1. A. Akavia, S. Goldwasser, V. Vaikuntanathan, Simultaneous hardcore bits and cryptography against memory attacks, in: R. Omer (Ed.), Proceedings of TCC 2009, San Francisco, CA, USA, in: LNCS, vol. 5444, March 2009, pp. 474–495.
2. Leakage-resilient public-key cryptography in the bounded-retrieval model;Alwen,2009
3. Secure Schemes for Secret Sharing and Key Distribution;Beimel,1996
4. Ciphertext-policy attribute-based encryption;Bethencourt,2007
5. Evaluating 2-dnf formulas on ciphertexts;Boneh,2005
Cited by
94 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献