参考文献
[1] 裴庆祺, 沈玉龙, 马建峰, 等. 无线传感器网络安全技术综述[J]. 通讯学报, 2007, 28(8): 113-122.
[2] 石高涛, 廖明宏. 一种大规模传感器网络节能数据发布协议[J]. 软件学报, 2006, 17(8): 1785-1795.
[3] 冯登国, 张 敏, 张 妍. 云计算安全研究[J]. 软件学报, 2011, 22(1): 71-83.
[4] Goldwasser S, Kalai Y T, Rothblum G N. Delegating Com- putation: Interactive Proofs for Muggles[C]//Proceedings of the 40th ACM Symposium on the Theory of Computing. New York, USA: ACM Press, 2008.
[5] Gennaro R, Gentry C, Parno B. Non-interactive Verifiable Computing: Outsourcing Computation to Untrusted Workers Advances in Cryptology[C]//Proceedings of the 30th Annual Conference on Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2010.
[6] Chung K M, Kalai Y, Vadhan S. Improved Delegation of Computation Using Fully Homomorphic Encryption[C]// Proceedings of the 30th Annual Conference on Advances in Cryptology. Berlin, Germany: Springer-Verlag, 2010.
(下转第56页)
(上接第48页)
[7] Parno B, Raykova M, Vaikuntanathan V. How to Delegate and Verify in Public: Verifiable Computation from Attribute-based Encryption[C]//Proceedings of the 9th IACR Theory of Cryptography Conference. Berlin, Germany: Springer-Verlag, 2012.
[8] Goyal V, Pandey O, Sahai A, et al. Attribute-based Encryption for Fine-grained Access Control of Encrypted Data[C]// Proceedings of the 13th ACM Conference on Computer and Communications Security. Alexandria, USA: ACM Press, 2006.
[9] Ostrovsky R, Sahai A, Waters B. Attribute-based Encryption with Non-monotonic Access Structures[C]//Proceedings of the 14th ACM Conference on Computer and Communications Security. Alexandria, USA: ACM Press, 2007: 195-203.
[10] Canetti R, Riva B, Rothblum G N. Veri?able Computation with Two or More Clouds[C]//Proceedings of Workshop on Cryptography and Security in Clouds. Zurich, Switzerland: [s. n.], 2011.
[11] Feige U, Kilian J. Making Games Short(Extended Abstract)[C]// Proceedings of the 29th Annual ACM Symposium on Theory of Computing. El Paso, USA: ACM Press, 1997.
[12] OASIS Standard Organization. Extensible Access Control Markup Language(XACML)[EB/OL]. (2005-02-01). http:// docs.oasis-open.org/xacml/2.0/access_control-xacml-2.0-core-spec-os.pdf.
编辑 任吉慧 |