New access control systems based on outsourced attribute-based encryption1. Li, J., Chen, X., Li, J., Jia, C., Ma, J., & Lou, W. Journal of Computer Security, 23(6):659--683, 2015.
Paper doi bibtex @article{DBLP:journals/jcs/LiCLJML15,
author = {Jin Li and
Xiaofeng Chen and
Jingwei Li and
Chunfu Jia and
Jianfeng Ma and
Wenjing Lou},
title = {New access control systems based on outsourced attribute-based encryption1},
journal = {Journal of Computer Security},
volume = {23},
number = {6},
pages = {659--683},
year = {2015},
url = {http://dx.doi.org/10.3233/JCS-150533},
doi = {10.3233/JCS-150533},
timestamp = {Thu, 21 Jul 2016 01:00:00 +0200},
biburl = {http://dblp.dagstuhl.de/rec/bib/journals/jcs/LiCLJML15},
bibsource = {dblp computer science bibliography, http://dblp.org}
}
Downloads: 0
{"_id":"MEAbK3owfptnwRc93","bibbaseid":"li-chen-li-jia-ma-lou-newaccesscontrolsystemsbasedonoutsourcedattributebasedencryption1-2015","downloads":0,"creationDate":"2016-10-21T15:13:51.299Z","title":"New access control systems based on outsourced attribute-based encryption1","author_short":["Li, J.","Chen, X.","Li, J.","Jia, C.","Ma, J.","Lou, W."],"year":2015,"bibtype":"article","biburl":"http://dblp.org/pers/tb2/l/Lou:Wenjing","bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Jin"],"propositions":[],"lastnames":["Li"],"suffixes":[]},{"firstnames":["Xiaofeng"],"propositions":[],"lastnames":["Chen"],"suffixes":[]},{"firstnames":["Jingwei"],"propositions":[],"lastnames":["Li"],"suffixes":[]},{"firstnames":["Chunfu"],"propositions":[],"lastnames":["Jia"],"suffixes":[]},{"firstnames":["Jianfeng"],"propositions":[],"lastnames":["Ma"],"suffixes":[]},{"firstnames":["Wenjing"],"propositions":[],"lastnames":["Lou"],"suffixes":[]}],"title":"New access control systems based on outsourced attribute-based encryption1","journal":"Journal of Computer Security","volume":"23","number":"6","pages":"659--683","year":"2015","url":"http://dx.doi.org/10.3233/JCS-150533","doi":"10.3233/JCS-150533","timestamp":"Thu, 21 Jul 2016 01:00:00 +0200","biburl":"http://dblp.dagstuhl.de/rec/bib/journals/jcs/LiCLJML15","bibsource":"dblp computer science bibliography, http://dblp.org","bibtex":"@article{DBLP:journals/jcs/LiCLJML15,\n author = {Jin Li and\n Xiaofeng Chen and\n Jingwei Li and\n Chunfu Jia and\n Jianfeng Ma and\n Wenjing Lou},\n title = {New access control systems based on outsourced attribute-based encryption1},\n journal = {Journal of Computer Security},\n volume = {23},\n number = {6},\n pages = {659--683},\n year = {2015},\n url = {http://dx.doi.org/10.3233/JCS-150533},\n doi = {10.3233/JCS-150533},\n timestamp = {Thu, 21 Jul 2016 01:00:00 +0200},\n biburl = {http://dblp.dagstuhl.de/rec/bib/journals/jcs/LiCLJML15},\n bibsource = {dblp computer science bibliography, http://dblp.org}\n}\n\n","author_short":["Li, J.","Chen, X.","Li, J.","Jia, C.","Ma, J.","Lou, W."],"key":"DBLP:journals/jcs/LiCLJML15","id":"DBLP:journals/jcs/LiCLJML15","bibbaseid":"li-chen-li-jia-ma-lou-newaccesscontrolsystemsbasedonoutsourcedattributebasedencryption1-2015","role":"author","urls":{"Paper":"http://dx.doi.org/10.3233/JCS-150533"},"downloads":0,"html":""},"search_terms":["new","access","control","systems","based","outsourced","attribute","based","encryption1","li","chen","li","jia","ma","lou"],"keywords":[],"authorIDs":[],"dataSources":["A7xqyS84Q4jXrtW8C"]}