Author:
Lai Junzuo,Deng Robert H.,Li Yingjiu
Publisher
Springer Berlin Heidelberg
Reference31 articles.
1. Lecture Notes in Computer Science,2008
2. Balu, A., Kuppusamy, K.: Ciphertext policy attribute based encryption with anonymous access policy. CoRR abs/1011.0527 (2010)
3. Bellare, M., Rogaway, P.: Random oracles are practical: A paradigm for designing efficient protocols. In: ACM Conference on Computer and Communications Security, pp. 62–73 (1993)
4. Bethencourt, J., Sahai, A., Waters, B.: Ciphertext-policy attribute-based encryption. In: IEEE Symposium on Security and Privacy, pp. 321–334. IEEE Computer Society, Los Alamitos (2007)
5. Lecture Notes in Computer Science;D. Boneh,2004
Cited by
143 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献