Author:
Yang Yanjiang,Liu Joseph K.,Liang Kaitai,Choo Kim-Kwang Raymond,Zhou Jianying
Publisher
Springer International Publishing
Reference36 articles.
1. Lecture Notes in Computer Science;N Attrapadung,2009
2. Lecture Notes in Computer Science;M Blaze,1998
3. Boneh, D., Ding, X., Tsudik, G., Wong, C.M.: A method for fast revocation of public key certificates and security capabilities. In: Proceedings of USENIX Security (2001)
4. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: Proceedings of IEEE S&P, pp. 321–334 (2007)
5. Choo, K.K.R.: Legal issues in the cloud. IEEE Cloud Comput. 1(1), 94–96 (2014)
Cited by
78 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献