Author:
Feng Xinyu,Jin Cancan,Li Cong,Fang Yuejian,Shen Qingni,Wu Zhonghai
Publisher
Springer International Publishing
Reference21 articles.
1. Aluvalu, R., Kamliya, V.: A survey on hierarchical attribute set based encryption (HASBE) access control model for cloud computing. Int. J. Comput. Appl. 112(7), 4–7 (2015)
2. Ambrosin, M., Conti, M., Dargahi, T.: On the feasibility of attribute-based encryption on smartphone devices, pp. 49–54 (2015)
3. Beimel, A.: Secure schemes for secret sharing and key distribution. Int. J. Pure Appl. Math. (1996)
4. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334 (2007)
5. Lecture Notes in Computer Science;R Bobba,2009