共 14 条
[3]
Tracing and revoking scheme for dynamic privileges against pirate rebroadcast[J] . Xingwen Zhao,Fangguo Zhang.Computers & Security . 2011 (1)
[5]
Cumulus[J] . Michael Vrable,Stefan Savage,Geoffrey M. Voelker.ACM Transactions on Storage (TOS) . 2009 (4)
[7]
Improved proxy re-encryption schemes with applications to secure distributed storage[J] . Giuseppe Ateniese,Kevin Fu,Matthew Green,Susan Hohenberger.ACM Transactions on Information and System Security (TISSEC) . 2006 (1)
[9]
Unidirectional Chosen-Ciphertext Secure Proxy Re-encryption .2 Libert B,Vergnaud D. PKC’’2008 . 2008
[10]
Attribute-Based encryption for fine-grained access control of encrypted data .2 Goyal V,Pandey O,Saha A,Waters B. Proc.of the ACM CCS 2006 . 2006