{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T14:17:22Z","timestamp":1730211442048,"version":"3.28.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,1,8]]},"DOI":"10.1109\/csp51677.2021.9357493","type":"proceedings-article","created":{"date-parts":[[2021,2,25]],"date-time":"2021-02-25T21:27:22Z","timestamp":1614288442000},"page":"12-16","source":"Crossref","is-referenced-by-count":1,"title":["Unified Attribute-Based Encryption Scheme for Industrial Internet of Things"],"prefix":"10.1109","author":[{"given":"Wei","family":"Li","sequence":"first","affiliation":[]},{"given":"Jing","family":"Si","sequence":"additional","affiliation":[]},{"given":"Jianhua","family":"Xing","sequence":"additional","affiliation":[]},{"given":"Yongjing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Deli","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Zhiyuan","family":"Sui","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"89","article-title":"Attribute-based encryption for fine-grained access control of encrypted data","author":"vipul","year":"2006","journal-title":"Proc 13th ACM Conf Comput Commun Security"},{"key":"ref11","first-page":"116","article-title":"An Encryption and Decryption Outsourcing CP-ABE scheme Supporting Efficient Ciphertext Evolution","author":"xincheng","year":"2020","journal-title":"Proc 4th Conf Crypto Security and Privacy"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"673","DOI":"10.1109\/TPDS.2010.130","article-title":"FDAC: Toward fine-grained distributed data access control in wireless sensor networks","volume":"22","author":"shucheng","year":"2011","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.3390\/s141222619"},{"key":"ref14","first-page":"33","article-title":"fABElous: An Attribute-Based Scheme for Industrial Internet of Things","author":"michele","year":"2019","journal-title":"Proc IEEE Conf Smart Comput"},{"key":"ref15","first-page":"321","article-title":"Ciphertext-policy attribute-based encryption","author":"john","year":"2007","journal-title":"Proc IEEE Symp Security Privacy"},{"key":"ref4","doi-asserted-by":"crossref","first-page":"22","DOI":"10.1109\/JIOT.2014.2306328","article-title":"Internet of Things for Smart Cities","volume":"1","author":"andrea","year":"2014","journal-title":"IEEE Internet of Things Journal"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"2266","DOI":"10.1016\/j.comnet.2012.12.018","article-title":"On the features and challenges of security and privacy in distributed internet of things","volume":"57","author":"rodrigo","year":"2013","journal-title":"Computer Networks"},{"key":"ref6","first-page":"515","article-title":"Farmbeats: an IoT platform for data-driven agriculture","author":"vasisht","year":"2017","journal-title":"Networked Systems Design and Implementation"},{"key":"ref5","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1016\/j.jii.2016.03.004","article-title":"The internet of things in healthcare: An overview","volume":"1","author":"yuehong","year":"2016","journal-title":"Journal of Industrial Information Integration"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1109\/MIE.2017.2649104","article-title":"The Future of Industrial Communication: Automation Networks in the Era of the Internet of Things and Industry 4.0","volume":"11","author":"martin","year":"2017","journal-title":"IEEE Industrial Electronics Magazine"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"2233","DOI":"10.1109\/TII.2014.2300753","article-title":"Internet of Things in Industries: A Survey","volume":"10","author":"li da","year":"2014","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"ref2","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1016\/j.bushor.2015.03.008","article-title":"The Internet of Things (IoT): Applications, investments, and challenges for enterprises","volume":"58","author":"in","year":"2015","journal-title":"Business Horizons"},{"key":"ref1","first-page":"1497","article-title":"Internet of things: Vision, applications and research challenges","author":"daniele","year":"2012","journal-title":"Proc Ad Hoc Networks"},{"key":"ref9","doi-asserted-by":"crossref","first-page":"2271","DOI":"10.1109\/TII.2017.2759178","article-title":"IIHub: An Industrial Internet-of-Things Hub Toward Smart Manufacturing Based on Cyber-Physical System","volume":"14","author":"fei","year":"2018","journal-title":"IEEE Transactions on Industrial Informatics"}],"event":{"name":"2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP)","start":{"date-parts":[[2021,1,8]]},"location":"Zhuhai, China","end":{"date-parts":[[2021,1,10]]}},"container-title":["2021 IEEE 5th International Conference on Cryptography, Security and Privacy (CSP)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9357511\/9357565\/09357493.pdf?arnumber=9357493","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T23:23:05Z","timestamp":1619479385000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9357493\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,1,8]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/csp51677.2021.9357493","relation":{},"subject":[],"published":{"date-parts":[[2021,1,8]]}}}