Attribute-Based Access Control with Efficient Revocation in Data Outsourcing Systems, IEEE Transactions on Parallel and Distributed Systems, vol.22, issue.7, pp.1214-1221, 2011. ,
DOI : 10.1109/TPDS.2010.203
Ciphertext-Policy Attribute-Based Encryption, 2007 IEEE Symposium on Security and Privacy (SP '07), pp.321-334, 2007. ,
DOI : 10.1109/SP.2007.11
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.3744
Identity-based encryption with efficient revocation, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, pp.417-426, 2008. ,
DOI : 10.1145/1455770.1455823
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.150.3047
Secure Attribute-Based Systems, Proc. ACM Conf. Computer and Comm. Security, 2006. ,
DOI : 10.3233/jcs-2009-0383
URL : http://doi.org/10.3233/jcs-2009-0383
A survey of key management for secure group communication, ACM Computing Surveys, vol.35, issue.3, pp.309-329, 2003. ,
DOI : 10.1145/937503.937506
Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application, Proc. Int'l Workshop Information Security Architecture (CSAW'07), 2007. ,
DOI : 10.1007/978-3-642-10838-9_23
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.473.6649
Attribute based data sharing with attribute revocation, Proceedings of the 5th ACM Symposium on Information, Computer and Communications Security, ASIACCS '10, 2010. ,
DOI : 10.1145/1755688.1755720
Attribute-Based Encryption with Non- Monotonoc Access Structures, Proc. ACM Conf. Computer and Comm. Security, pp.195-203, 2007. ,
Ciphertext Policy Attribute Based Encryption with Efficient Revocation. technical report, 2011. ,
Conjunctive Broadcast and Attribute-Based Encryption . Pairing '09, Proc.Int'l Conf.Palo Alto on Pairing-Based Cryptography, pp.248-265, 2009. ,
DOI : 10.1007/978-3-642-03298-1_16
Efficient and Secure Data Storage Operations for Mobile Cloud Computing, Cryptology ePrint Archive, vol.185, 2011. ,
Ciphertext-Policy Attribute-Based Encryption: An Expressive, Efficient, and Provably Secure Realization, Communications of the ACM, pp.53-70, 2011. ,
DOI : 10.1007/978-3-642-19379-8_4
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.141.1719
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
DOI : 10.1145/359168.359176
A New Efficient Verifiable Fuzzy Keyword Search Scheme Journal of wireless mobile Networks, Ubiquitous Computing and Dependable Applications, pp.61-71, 2012. ,
A New Trapdoor-indistinguishable Public Key Encryption with Keyword Search, Journal of wireless mobile Networks, Ubiquitous Computing and Dependable Applications, pp.72-81, 2012. ,