Zhang X, Jin C, Li C, Wen Z, Shen Q, Fang Y, Wu Z.
Ciphertext-Policy Attribute-Based Encryption with User and Authority Accountability, in
Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers.Vol 164. Springer; 2015:500–518.
访问链接 Cheng Y, Li Q, Yu M, Ding X, Shen Q.
SuperCall: A Secure Interface for Isolated Execution Environment to Dynamically Use External Services, in
Security and Privacy in Communication Networks - 11th International Conference, SecureComm 2015, Dallas, TX, USA, October 26-29, 2015, Revised Selected Papers.Vol 164. Springer; 2015:193–211.
访问链接 Dong C, Shen Q, Li W, Yang Y, Wu Z, Wan X.
Eavesdropper: A Framework for Detecting the Location of the Processed Result in Hadoop, in
Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers.Vol 9543. Springer; 2015:458–466.
访问链接 Sun Z, Yang Y, Shen Q, Wu Z, Li X.
MB-DDIVR: A Map-Based Dynamic Data Integrity Verification and Recovery Scheme in Cloud Storage, in
Information and Communications Security - 17th International Conference, ICICS 2015, Beijing, China, December 9-11, 2015, Revised Selected Papers.Vol 9543. Springer; 2015:335–345.
访问链接