Publisher
Springer Science and Business Media LLC
Reference64 articles.
1. Adelsbach A, Huber U, Sadeghi AR (2006) Property-based broadcast encryption for multi-level security policies. In: Won DH, Kim S (eds) Information security and cryptology—ICISC 2005: 8th international conference, Seoul, Korea, December 1–2, 2005, Revised Selected Papers. Springer, Berlin, pp 15–31. https://doi.org/10.1007/11734727_4
2. Apu K, Patrick PT, Sean WS (2007) Attribute-based publishing with hidden credentials and hidden policies. In: The 14th annual network and distributed system security symposium (NDSS ’07), pp 179–192 (to appear). http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.124.4180
3. Attrapadung N, Imai H (2009) Dual-policy attribute based encryption. In: Abdalla M, Pointcheval D, Fouque PA, Vergnaud D (eds) Applied cryptography and network security. ACNS 2009. Lecture notes in computer science, vol 5536. Springer, Berlin, Heidelberg, pp 168–185. https://doi.org/10.1007/978-3-642-01957-9_11
4. Bellare M, Desai A, Pointcheval D, Rogaway P (1998) Relations among notions of security for public-key encryption schemes. In Krawczyk H (eds) Advances in Cryptology — CRYPTO '98. CRYPTO 1998. Lecture notes in computer science, vol 1462. Springer, Berlin, Heidelberg, pp 26–45. https://doi.org/10.1007/BFb0055718
5. Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. 2007 IEEE symposium on security and privacy (SP '07), Berkeley, CA, USA, 2007, pp. 321–334. https://doi.org/10.1109/SP.2007.11
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献