Author:
Blömer Johannes,Günther Peter,Krummel Volker,Löken Nils
Publisher
Springer International Publishing
Reference18 articles.
1. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: 2007 IEEE Symposium on Security and Privacy, pp. 321–334 (2007)
2. Lecture Notes in Computer Science;M Chase,2007
3. Chatterjee, S., Menezes, A.: On cryptographic protocols employing asymmetric pairings—the role of
$$\varPsi $$
revisited. Discret. Appl. Math. 159(13), 1311–1322 (2011)
4. Cloud Security Alliance: SecaaS implementation guidance category 8: Encryption (2012).
https://downloads.cloudsecurityalliance.org/initiatives/secaas/SecaaS_Cat_8_Encryption_Implementation_Guidance.pdf
. Accessed 06 July 2017
5. Fujisaki, E., Okamoto, T.: Secure integration of asymmetric and symmetric encryption schemes. J. Cryptol. 26(1), 80–101 (2013)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献