Attribute-based encryption without key cloning. Hinek, M. J., Jiang, S., Safavi-Naini, R., & Shahandashti, S. F. IJACT, 2(3):250--270, 2012.
Paper doi bibtex @article{DBLP:journals/ijact/HinekJSS12,
author = {M. Jason Hinek and
Shaoquan Jiang and
Reihaneh Safavi{-}Naini and
Siamak Fayyaz Shahandashti},
title = {Attribute-based encryption without key cloning},
journal = {{IJACT}},
volume = {2},
number = {3},
pages = {250--270},
year = {2012},
url = {http://dx.doi.org/10.1504/IJACT.2012.045587},
doi = {10.1504/IJACT.2012.045587},
timestamp = {Fri, 23 Mar 2012 00:00:00 +0100},
biburl = {http://dblp.dagstuhl.de/rec/bib/journals/ijact/HinekJSS12},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
Downloads: 0
{"_id":"oYb84TXdKG8xrkiwi","bibbaseid":"hinek-jiang-safavinaini-shahandashti-attributebasedencryptionwithoutkeycloning-2012","downloads":0,"creationDate":"2016-09-08T16:00:30.754Z","title":"Attribute-based encryption without key cloning","author_short":["Hinek, M. J.","Jiang, S.","Safavi-Naini, R.","Shahandashti, S. F."],"year":2012,"bibtype":"article","biburl":"http://dblp.org/pers/tb2/s/Shahandashti:Siamak_F=","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["M.","Jason"],"propositions":[],"lastnames":["Hinek"],"suffixes":[]},{"firstnames":["Shaoquan"],"propositions":[],"lastnames":["Jiang"],"suffixes":[]},{"firstnames":["Reihaneh"],"propositions":[],"lastnames":["Safavi-Naini"],"suffixes":[]},{"firstnames":["Siamak","Fayyaz"],"propositions":[],"lastnames":["Shahandashti"],"suffixes":[]}],"title":"Attribute-based encryption without key cloning","journal":"IJACT","volume":"2","number":"3","pages":"250--270","year":"2012","url":"http://dx.doi.org/10.1504/IJACT.2012.045587","doi":"10.1504/IJACT.2012.045587","timestamp":"Fri, 23 Mar 2012 00:00:00 +0100","biburl":"http://dblp.dagstuhl.de/rec/bib/journals/ijact/HinekJSS12","bibsource":"dblp computer science bibliography, http://dblp.org","bibtex":"@article{DBLP:journals/ijact/HinekJSS12,\n author = {M. Jason Hinek and\n Shaoquan Jiang and\n Reihaneh Safavi{-}Naini and\n Siamak Fayyaz Shahandashti},\n title = {Attribute-based encryption without key cloning},\n journal = {{IJACT}},\n volume = {2},\n number = {3},\n pages = {250--270},\n year = {2012},\n url = {http://dx.doi.org/10.1504/IJACT.2012.045587},\n doi = {10.1504/IJACT.2012.045587},\n timestamp = {Fri, 23 Mar 2012 00:00:00 +0100},\n biburl = {http://dblp.dagstuhl.de/rec/bib/journals/ijact/HinekJSS12},\n bibsource = {dblp computer science bibliography, http://dblp.org}\n}\n\n","author_short":["Hinek, M. J.","Jiang, S.","Safavi-Naini, R.","Shahandashti, S. F."],"key":"DBLP:journals/ijact/HinekJSS12","id":"DBLP:journals/ijact/HinekJSS12","bibbaseid":"hinek-jiang-safavinaini-shahandashti-attributebasedencryptionwithoutkeycloning-2012","role":"author","urls":{"Paper":"http://dx.doi.org/10.1504/IJACT.2012.045587"},"downloads":0},"search_terms":["attribute","based","encryption","without","key","cloning","hinek","jiang","safavi-naini","shahandashti"],"keywords":["dblp"],"authorIDs":[],"dataSources":["AAtnczn2eGLrgTuTj"]}