Computer Science ›› 2015, Vol. 42 ›› Issue (2): 123-126.doi: 10.11896/j.issn.1002-137X.2015.02.026
Previous Articles Next Articles
ZHANG Bin, LI Dong-hui, XIONG Hou-ren and FEI Xiao-fei
[1] 葛维进,胡晓惠.EAEBHCM:一种扩展的基于属性加密的隐藏证书模型[J].通信学报,2012,2:85-92 [2] Winsborough W H,seamons K E,Jones V E.Automated trust negotiation[J].IEEE Computer Society Press,2012(4):362-366 [3] 廖振松,金海,李赤松,等.自动信任协商及其发展趋势[J].计算机应用与软件,2006,7(9):1933-1948 [4] 葛维进,胡晓惠,邓勇.基于隐藏证书的XACML访问控制扩展模型[J].计算机应用与软件,2011,8(3):265-268 [5] Lai J,Deng R H,Li Y.Fully secure cipertext-policy hiding CP-ABE[C]∥ISPEC 2011.2011:24-39 [6] Yu S C,Ren K,Low W J.Attribute-based on-demand multicast group setup with membership anonymity[J].Computer Networks,2010,4(3):377-386 [7] 赵春明.可保护授权隐私性的匿名传输[D].西安:西安电子科技大学,2006(9) [8] Shaniqng G,Yingpei Z.Attribute-based signature scheme[C]∥International Conference on Information Security and Assu-rance(ISA2008).USA:IEEE,2008:509-511 [9] 马春光,石岚,汪定.基于访问树的属性基签名算法[J].电子科技大学学报,2013,42(3):410-414 [10] Shahandashti S,Safavi-Naini R.Threshold attribute-based signatures and their application to anonymous credential systems[C]∥Progress in Cryptology AFRICACRYPT.Berlin Heidelberg:Spring,2009 [11] 陈剑锋.基于属性签名方案的研究[D].广州 :中山大学,2010,7 [12] 马春光,石岚,周长利,等.属性基关系限签名方案及其安全性研究[J].电子学报,2013,1(5):1012-1015 [13] 王继林,陈晓峰,陈德人.无安全信道的OSBE方案[J].浙江大学学报,2006,0(4):590-593 |
No related articles found! |
|