参考文献
[1]HAN B,HUI P,KUMAR V S A,et al.Mobile data offloading through opportunistic communications and social participation[J].IEEE Transactions on Mobile Computing,2012,11(5):821-834.
[2]ADOMAVICIUS G,TUZHILIN A.Toward the next generation of recommender systems:a survey of the state-of-the-art and possible extensions[J].IEEE Transactions on Knowledge and Data Engineering,2005,17(6):734-749.
[3]MAZUREK M L,ARSENAULT J P,BRESEE J,et al.Access control for home data sharing:attitudes,needs and practices[C]//Proceedings of SIGCHI Conference on Human Factors in Computing Systems.New York,USA:ACM Press,2010:645-654.
[4]DEARMAN D,PIERCE J S.It’s on my other computer!:computing with multiple devices[C]//Proceedings of SIGCHI Conference on Human Factors in Computing Systems.New York,USA:ACM Press,2008:767-776.
[5]LEKAKIS V,BASAGALAR Y,KELEHER P.Don’t trust your roommate or access control and replication protocols in home environments[C]//Proceedings of USENIX Conference on Hot Topics in Storage and File Systems.[S.l.]:USENIX Press,2012:12-17.
[6]KIM T H J,BAUER L,NEWSOME J,et al.Challenges in access right assignment for secure home networks[C]//Proceedings of USENIX Conference on Hot Topics in Security.[S.l.]:USENIX Press,2010:1-6.
[7]KIM T H J,BAUER L,NEWSOME J,et al.Access right assignment mechanisms for secure home networks[J].Journal of Communications and Networks,2011,13(2):175-186.
[8]ADAMS C,LLOYD S.Understanding PKI:concepts,standards,and deployment considerations[M].[S.l.]:Addison-Wesley Longman Publishing Co.,Inc.,2002.
[9]TOORANI M,BEHESHTI A.LPKI-A lightweight public key infrastructure for the mobile environments[C]//Proceedings of the 11th IEEE Singapore International Con-ference on Communication Systems.Washington D.C.,USA:IEEE Press,2008:162-166.
[10]李勤祎.基于属性的加密算法研究[D].成都:电子科技大学,2013.
[11]余敏达.基于属性的加密体制研究与实现[D].济南:山东大学,2013.
[12]屈娟,张建中.基于双线性对的动态广义秘密共享方案[J].计算机应用,2010,30(11):3036-3037.
[13]LI C T,LEE C C.A novel user authentication and privacy preserving scheme with smart cards for wireless com-munications[J].Mathematical and Computer Modelling,2012,55(1):35-44.
[14]HOHENBERGER S,WATERS B.Attribute-based encryption with fast decryption[C]//Proceedings of the 16th International Conference on Practice and Theory in Public-Key Cryptography.Berlin,Germany:Springer,2013:162-179.
[15]HUR J,NOH D K.Attribute-based access control with efficient revocation in data outsourcing systems[J].IEEE Transactions on Parallel and Distributed Systems,2011,22(7):1214-1221.
[16]YANG K,JIA X,REN K.Attribute-based fine-grained access control with efficient revocation in cloud storage systems[C]//Proceedings of the 8th ACM SIGSAC Symposium on Information,Computer and Communica-tions Security.New York,USA:ACM Press,2013:523-528.
[17]BETHENCOURT J,SAHAI A,WATERS B.Ciphertext-policy attribute-based encryption[C]//Proceedings of IEEE Sympo-sium on Security and Privacy.Washington D.C.,USA:IEEE Computer Society,2007:321-334.
[18]LI J,WANG Q,WANG C,et al.Enhancing attribute-based encryption with attribute hierarchy[J].Mobile Networks and Applications,2011,16(5):553-561.
[19]LIU Z,CAO Z.On efficiently transferring the linear secret-sharing scheme matrix in ciphertext-policy attribute-based encryption[EB/OL].[2016-11-02].https://pdfs.semanticscholar.org/8f05/02461693d016c 6a46b73ad20f4fc23f45c54.pdf.
编辑吴云芳 |