Publisher
Springer International Publishing
Reference16 articles.
1. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy (SP 2007), pp. 321–334 (2007). https://doi.org/10.1109/SP.2007.11
2. Lecture Notes in Computer Science;M Chase,2007
3. Goyal, V., Pandey, O., Sahai, A., Waters, B.: Attribute-based encryption for fine-grained access control of encrypted data. In: ACM CCS, pp. 89–98, ACM, New York, USA (2006). https://doi.org/10.1145/1180405.1180418
4. Hu, V.C., et al.: Guide to Attribute Based Access Control (ABAC) Definition and Considerations. Technical reports, National Institute of Standards and Technology, Gaithersburg, MD (2014). https://doi.org/10.6028/NIST.SP.800-162
5. Kiraz, M.S., Uzunkol, O.: Still Wrong Use of Pairings in Cryptography. CoRR (2016). http://arxiv.org/abs/1603.02826