[1] |
SAHAI A , WATERS B . Fuzzy identity-based encryption[C]// Annual International Conference on the Theory and Applications of Cryptographic Techniques,May 22-26,2005,Aarhus,Denmark. Heidelberg:Springer, 2005: 457-473.
|
[2] |
HOHENBERGER S , WATERS B . Attribute-based encryption with fast decryption[C]// Public-Key Cryptography-PKC 2013. Heidelberg:Springer, 2013: 162-179.
|
[3] |
HOHENBERGER S , WATERS B . Online/offline attributebased encryption[M]// International Workshop on Public Key Cryptography,Mar 26-28,2014,Buenos Aires,Argentina. Heidelberg:Springer, 2014: 293-310.
|
[4] |
GREEN M , HOHENBERGER S , WATERS B . Outsourcing the decryption of ABE ciphertexts[C]// Usenix Conference on Security,Aug8-12,2011,San Francisco,USA. Berkeley:USENIX Association, 2011:34.
|
[5] |
WATERS B , . Ciphertext-policy attribute-based encryption:An expressive,efficient,and provably secure realization[C]// International Workshop on Public Key Cryptography,March 6-9,2011,Taormina,Italy. Heidelberg:Springer, 2011: 53-70.
|
[6] |
李子姝, 谢人超, 孙礼 ,等. 移动边缘计算综述[J]. 电信科学, 2018,34(1): 87-101.
|
|
LI Z S , XIE R C , SUN L ,et al. A survey of mobile edge computing[J]. Telecommunications Science, 2018,34(1): 87-101.
|
[7] |
朱友康, 乐光学, 杨晓慧 ,等. 移动边缘迁移研究综述[J]. 电信科学, 2019,35(4): 74-94.
|
|
ZHU Y K , LE G X , YANG X H ,et al. A survey on edge computing offloading[J]. Telecommunications Science, 2019,35(4): 74-94.
|