1. Enforcing location and time-based access control on cloud-stored data;Androulaki,2014
2. Ciphertext-policy attribute-based encryption;Bethencourt,2007
3. Identity-based encryption from the Weil pairing;Boneh,2001
4. Evaluating 2-DNF formulas on ciphertexts;Boneh,2005