Certificateless Encryption In Public Cloud For Secure Data Transmission
暂无分享,去创建一个
[1] Philip Tavel,et al. Modeling and Simulation Design , 2011 .
[2] Jonathan Katz,et al. Predicate Encryption Supporting Disjunctions, Polynomial Equations, and Inner Products , 2008, Journal of Cryptology.
[3] Larry L. Peterson,et al. Reasoning about naming systems , 1993, TOPL.
[4] Brent Waters,et al. Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.
[5] George Forman,et al. An Extensive Empirical Study of Feature Selection Metrics for Text Classification , 2003, J. Mach. Learn. Res..
[6] Dan Boneh,et al. Fine-grained control of security capabilities , 2004, TOIT.
[7] Gary Marchionini,et al. A study on video browsing strategies , 1997 .
[8] Hong Hua,et al. A widget framework for augmented interaction in SCAPE , 2003, UIST '03.
[9] Yuen-Tak Yu,et al. A comparison of MC/DC, MUMCUT and several other coverage criteria for logical decisions , 2006, J. Syst. Softw..
[10] Bernd Fröhlich,et al. The cubic mouse: a new device for three-dimensional input , 2000, CHI.
[11] Brent Waters,et al. Conjunctive, Subset, and Range Queries on Encrypted Data , 2007, TCC.
[12] Michael Sannella,et al. Constraint satisfaction and debugging for interactive user interfaces , 1994 .
[13] Matthew Green,et al. Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials , 2009, Public Key Cryptography.
[14] Jan Camenisch,et al. Oblivious transfer with access control , 2009, IACR Cryptol. ePrint Arch..