{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,4]],"date-time":"2026-04-04T18:24:42Z","timestamp":1775327082321,"version":"3.50.1"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1109\/glocom.2011.6133609","type":"proceedings-article","created":{"date-parts":[[2012,1,30]],"date-time":"2012-01-30T21:45:17Z","timestamp":1327959917000},"page":"1-5","source":"Crossref","is-referenced-by-count":12,"title":["Reliable Re-Encryption in Unreliable Clouds"],"prefix":"10.1109","author":[{"family":"Qin Liu","sequence":"first","affiliation":[]},{"given":"C. C.","family":"Tan","sequence":"additional","affiliation":[]},{"family":"Jie Wu","sequence":"additional","affiliation":[]},{"family":"Guojun Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","article-title":"Attribute based data sharing with attribute revocation","author":"yu","year":"0","journal-title":"Proc of ACM ASIACCS 2010"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1127345.1127346"},{"key":"16","article-title":"Over-encryption: Management of access control evolution on outsourced data","author":"di vimercati","year":"0","journal-title":"Proceedings of the VLDB 2007"},{"key":"13","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-84996-241-4","author":"antonopoulos","year":"2010","journal-title":"Cloud Computing Principles Systems and Applications"},{"key":"14","article-title":"Plutus: Scalable secure file sharing on untrusted storage","author":"kallahalla","year":"0","journal-title":"Proc of USENIX FAST 2003"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/501416.501440"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/2.58235"},{"key":"3","article-title":"Fuzzy identity-based encryption","author":"sahai","year":"2005","journal-title":"Advances in Cryptology-Eurocrypt"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1721654.1721672"},{"key":"1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-14992-4_13","article-title":"Cryptographic cloud storage","author":"kamara","year":"2010","journal-title":"Financial Cryptography and Data Security"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1007\/BF01784024"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455823"},{"key":"6","doi-asserted-by":"crossref","DOI":"10.1007\/BFb0054122","article-title":"Divertible protocols and atomic proxy cryptography","author":"blaze","year":"1998","journal-title":"Advances in Cryptology-Eurocrypt"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2007.11"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"8","author":"wang","year":"2010","journal-title":"Proc of ACM CCS"}],"event":{"name":"2011 IEEE Global Communications Conference (GLOBECOM 2011)","location":"Houston, TX, USA","start":{"date-parts":[[2011,12,5]]},"end":{"date-parts":[[2011,12,9]]}},"container-title":["2011 IEEE Global Telecommunications Conference - GLOBECOM 2011"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6132211\/6133457\/06133609.pdf?arnumber=6133609","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T11:59:54Z","timestamp":1593604794000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6133609\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,12]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/glocom.2011.6133609","relation":{},"subject":[],"published":{"date-parts":[[2011,12]]}}}