Author:
Lyu Chen,Sun Shi-Feng,Zhang Yuanyuan,Pande Amit,Lu Haining,Gu Dawu
Funder
National Natural Science Foundation of China
Doctoral Fund of Ministry of Education of China
Innovation Programs by Shanghai Municipal Science and Technology Commission
China Scholarship Council
National Key Technology R&D Program
Subject
Computer Networks and Communications,Computer Science Applications,Hardware and Architecture
Reference38 articles.
1. Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D., 2009. Persona: an online social network with user-defined privacy. In: Proceedings of ACM SIGCOMM 2009. ACM, New York, NY, USA, pp. 135–146.
2. Beimel, A., 1996. Secure Schemes for Secret Sharing and Key Distribution (Ph.D. thesis). Israel Institute of Technology, Technion, Haifa, Israel.
3. Bethencourt, J., Sahai, A., Waters, B., 2007. Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy 2007, SP'07. IEEE, pp. 321–334.”.
4. Boldyreva, A., Goyal, V., Kumar, V., 2008. Identity-based encryption with efficient revocation. In: Proceedings of the 15th ACM Conference on Computer and Communications Security, CCS'08. ACM, New York, NY, USA, pp. 417–426.
5. Boneh, D., Di Crescenzo, G., Ostrovsky, R., Persiano, G., 2004. Public key encryption with keyword search. In: Advances in Cryptology – Eurocrypt 2004. Springer, pp. 506–522.
Cited by
10 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献