{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,3]],"date-time":"2026-01-03T06:50:10Z","timestamp":1767423010611},"reference-count":43,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T00:00:00Z","timestamp":1694390400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T00:00:00Z","timestamp":1694390400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,9,11]]},"DOI":"10.1109\/enc60556.2023.10508640","type":"proceedings-article","created":{"date-parts":[[2024,4,30]],"date-time":"2024-04-30T17:33:14Z","timestamp":1714498394000},"page":"1-8","source":"Crossref","is-referenced-by-count":1,"title":["Large Universe Attribute-based Encryption with Multiple Authorities and Outsourced Decryption for Fog-enabled Internet of Things"],"prefix":"10.1109","author":[{"given":"Alejandro","family":"Pe\u00f1uelas-Angulo","sequence":"first","affiliation":[{"name":"Instituto Nacional de Astrof&#x00ED;sica, &#x00D3;ptica y Electr&#x00F3;nica San Andr&#x00E9;s Cholula,Puebla,M&#x00E9;xico"}]},{"given":"Claudia","family":"Feregrino-Uribe","sequence":"additional","affiliation":[{"name":"Instituto Nacional de Astrof&#x00ED;sica, &#x00D3;ptica y Electr&#x00F3;nica San Andr&#x00E9;s Cholula,Puebla,M&#x00E9;xico"}]},{"given":"Miguel","family":"Morales-Sandoval","sequence":"additional","affiliation":[{"name":"Instituto Nacional de Astrof&#x00ED;sica, &#x00D3;ptica y Electr&#x00F3;nica San Andr&#x00E9;s Cholula,Puebla,M&#x00E9;xico"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2018.02.009"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.08.018"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2007.12.010"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ENC56672.2022.9882941"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2011.04.021"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s12652-021-02915-5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"volume-title":"Secure schemes for secret sharing and key distribution","year":"1996","author":"Beimel","key":"ref9"},{"key":"ref10","article-title":"Efficient generation of linear secret sharing scheme matrices from threshold access trees","author":"Liu","year":"2010","journal-title":"Cryptology ePrint Archive"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516672"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47854-7_19"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-69471-9_8"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-016-9019-8"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2018.2825289"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3110824"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2890976"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3126780"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.suscom.2021.100527"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2020.3044309"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1155\/2021\/6661450"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2021.3052247"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2021.108196"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2021.3122949"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CITS55221.2022.9832996"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20465-4_31"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/NCA.2017.8171357"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.3390\/s17071695"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2018.05.078"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0207543"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.036"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2019.04.003"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0258062"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2022.08.017"},{"article-title":"Outsourcing the decryption of {ABE}ciphertexts","volume-title":"20th USENIX Security Symposium (USENIX Security 11)","author":"Green","key":"ref36"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2016.10.028"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.3025140"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2020.1841096"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03382-5"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-61273-7_5"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/s00145-018-9280-5"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.6028\/nist.sp.800-57pt1r5"}],"event":{"name":"2023 Mexican International Conference on Computer Science (ENC)","start":{"date-parts":[[2023,9,11]]},"location":"Guanajuato, Guanajuato, Mexico","end":{"date-parts":[[2023,9,13]]}},"container-title":["2023 Mexican International Conference on Computer Science (ENC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10508598\/10508600\/10508640.pdf?arnumber=10508640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,3]],"date-time":"2024-05-03T18:26:23Z","timestamp":1714760783000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10508640\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,9,11]]},"references-count":43,"URL":"https:\/\/doi.org\/10.1109\/enc60556.2023.10508640","relation":{},"subject":[],"published":{"date-parts":[[2023,9,11]]}}}