Author:
Mu Tianshi,Lai Yuyang,Feng Guocong,Lyu Huahui,Yang Hang,Deng Jianfeng
Reference32 articles.
1. Performance modeling for data monitoring services in smart grid: A network calculus based approach;Cao;CSEE J. Power Energy Syst.,2020
2. Chapter 7 - role of microphasor measurement unit for decision making based on enhanced situational awareness of a modern distribution system;Dutta,2020
3. A. Sahai, B. Waters, Fuzzy identity-based encryption, in: Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Vol. 3494, 2005, pp. 457–473.
4. Y. Zhang, R.H. Deng, S. Xu, J. Sun, Q. Li, D. Zheng, Attribute-based encryption for cloud computing access control: A survey, ACM Comput. Surv. 53 (4) (2020) 83:1–83:41.
5. J. Bethencourt, A. Sahai, B. Waters, Ciphertext-policy attribute-based encryption, in: Proceedings of the 2007 IEEE Symposium on Security and Privacy, 2007, pp. 321–334.
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献