Revocable Attribute-Based Encryption Scheme with Cryptographic Reverse Firewalls.
Y. Zhao, X. Ke, Y. Pang, H. Xiong, G. Zhu, and K. Yeh. BDTA, volume 555 of Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, page 79-94. Springer, (2023)
@inproceedings{conf/bdta/ZhaoKPXZY23,
added-at = {2024-02-07T00:00:00.000+0100},
author = {Zhao, Yang and Ke, Xingyu and Pang, Yuwei and Xiong, Hu and Zhu, Guobin and Yeh, Kuo-Hui},
biburl = {https://www.bibsonomy.org/bibtex/21af3512b5737a3a91b17d67ae9e0d5b9/dblp},
booktitle = {BDTA},
crossref = {conf/bdta/2023},
editor = {Tan, Zhiyuan and Wu, Yulei and Xu, Min},
ee = {https://doi.org/10.1007/978-3-031-52265-9_6},
interhash = {6faf7093b04d8bdb6bfcf1883a0c66b7},
intrahash = {1af3512b5737a3a91b17d67ae9e0d5b9},
isbn = {978-3-031-52265-9},
keywords = {dblp},
pages = {79-94},
publisher = {Springer},
series = {Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering},
timestamp = {2024-04-09T16:19:54.000+0200},
title = {Revocable Attribute-Based Encryption Scheme with Cryptographic Reverse Firewalls.},
url = {http://dblp.uni-trier.de/db/conf/bdta/bdta2023.html#ZhaoKPXZY23},
volume = 555,
year = 2023
}