[1] |
Google docs- online documents, spreadsheets, present[EB/OL]. . 2009.
|
[2] |
Windows Azure platform[EB/OL]. . 2009.
|
[3] |
Amazon elastic compute cloud[EB/OL]. , 2009.
|
[4] |
SONGD , WAGNERD , PERRIGA . Practical techniques for searches on encrypted data[A]. Proceedings of the IEEE Symposium on Secu-rity and Privacy(S&P'00)[C]. Berkeley, CA,USA. 2000. 44-55.
|
[5] |
BONEHD , CRESCENZOG , OSTROVSKYETR , et al. Public key encryption with keyword search[A]. Proceedings of the Annual International Conference on the Theory and Application Crypto-graphic Techniques[C]. Interlaken, Switzerland, 2004. 506-522.
|
[6] |
PARKD , KIMK , LEEP . Public key encryption with conjunctive field keyword search[A]. Proceedings of the 2004 Workshop on Informa-tion Security Applications (WISA'04)[C]. Wuhan, China. 2004. 73-86.
|
[7] |
ZHOUJ , GOLLMANND . A faire non-repudiation protocol[A]. Proc of the 1996 IEEE Symp on Security and Privacy[C]. Oakland: IEEE Computer Press, 1996. 555-61.
|
[8] |
FRANKLINM K , REITERM K . Faire exchange with a semi-trusted third party[A]. Proc of the 4th ACM Conf on Computer and Commu-nications Security[C]. Zurich, Switzerland, 1997. 1-5.
|
[9] |
孙艳宾, 谷利泽, 孙燕 等. 基于并发签名的公平交易协议的分析与改进[J]. 通信学报, 2010,31(9): 146-150. SUNY B , GUL Z , SUNY , et al. Analysis and improvement of the CS-based fair exchange protocol[J]. Journal on Communications, 2010,31(9): 146-150.
|
[10] |
ASOKANN , SCHUNTERM , WAIDNERM . Optimistic protocols fair exchange[A]. Tsutomu Matsumoto, Editor, 4th ACM Conference on Computer and Communications security[C]. Switzerland, 1997. 6-17.
|
[11] |
刘景伟, 孙蓉, 郭庆燮 . 公平交换签名方案[J]. 中国科学:信息科学, 2010,40(6): 786-795. LIUJ W , SUNR , GUOQ X . Fair exchange signature scheme[J]. Science in China: Information Science, 2010,40(6): 786-795.
|
[12] |
WENGJ , DENGR H , DINGX , et al. Conditional proxy re-encrytion secure against chosen-ciphertext attack[A]. Proc of ASIACCS'09[C]. Sydney, Australia, 2009. 322-332.
|
[13] |
WENGJ , YANGY , TANGQ , et al. Efficient conditional proxy re-encryption with chosen-ciphertext security[A]. Proc of ISC'09[C]. 2009. 151-166.
|
[14] |
ZHOUD H , CHENK F , LIUS L . Identity-based conditional proxy re-encryption[A]. Proc of CHINACRYPT'09[C]. 2009. 85-97.
|
[15] |
BONEHD , FRANKLINM . Identity-based encryption from the weil pairing[J]. SIAM Journal of Computing, 32(3): 586-615.
|