{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T05:32:17Z","timestamp":1725773537512},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1109\/glocom.2018.8647309","type":"proceedings-article","created":{"date-parts":[[2019,2,21]],"date-time":"2019-02-21T18:34:06Z","timestamp":1550774046000},"page":"206-212","source":"Crossref","is-referenced-by-count":3,"title":["Customized Data Sharing Scheme Based on Blockchain and Weighted Attribute"],"prefix":"10.1109","author":[{"given":"Longxia","family":"Huang","sequence":"first","affiliation":[]},{"given":"Gongxuan","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Shui","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Anmin","family":"Fu","sequence":"additional","affiliation":[]},{"given":"John","family":"Yearwood","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"ref10","DOI":"10.1109\/TSC.2016.2633260"},{"doi-asserted-by":"publisher","key":"ref11","DOI":"10.1109\/TKDE.2011.78"},{"key":"ref12","first-page":"457","article-title":"Fuzzy identity-based encryption","author":"sahai","year":"2005","journal-title":"Annual International Conference on the Theory and Applications of Cryptographic Techniques Springer"},{"doi-asserted-by":"publisher","key":"ref13","DOI":"10.1109\/ICCW.2014.6881280"},{"doi-asserted-by":"publisher","key":"ref14","DOI":"10.1145\/1594977.1592585"},{"key":"ref15","first-page":"514","article-title":"Short signatures from the weil pairing","author":"dan","year":"2001","journal-title":"International Conference on the Theory and Application of Cryptology and Information Security"},{"doi-asserted-by":"publisher","key":"ref4","DOI":"10.1109\/INFOCOM.2018.8485890"},{"key":"ref3","article-title":"Seshare: Secure cloud data sharing based on blockchain and public auditing","author":"huang","year":"2017","journal-title":"Concurrency & Computation Practice & Experience"},{"doi-asserted-by":"publisher","key":"ref6","DOI":"10.1007\/s11277-018-5634-4"},{"doi-asserted-by":"publisher","key":"ref5","DOI":"10.1109\/GLOCOM.2017.8254521"},{"doi-asserted-by":"publisher","key":"ref8","DOI":"10.1145\/1315245.1315318"},{"doi-asserted-by":"publisher","key":"ref7","DOI":"10.1109\/ACCESS.2016.2577036"},{"doi-asserted-by":"publisher","key":"ref2","DOI":"10.1109\/TIFS.2016.2549004"},{"doi-asserted-by":"publisher","key":"ref1","DOI":"10.1109\/TC.2015.2389955"},{"doi-asserted-by":"publisher","key":"ref9","DOI":"10.1109\/GLOCOM.2017.8254090"}],"event":{"name":"GLOBECOM 2018 - 2018 IEEE Global Communications Conference","start":{"date-parts":[[2018,12,9]]},"location":"Abu Dhabi, United Arab Emirates","end":{"date-parts":[[2018,12,13]]}},"container-title":["2018 IEEE Global Communications Conference (GLOBECOM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8634808\/8647127\/08647309.pdf?arnumber=8647309","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,27]],"date-time":"2022-01-27T03:24:32Z","timestamp":1643253872000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8647309\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,12]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/glocom.2018.8647309","relation":{},"subject":[],"published":{"date-parts":[[2018,12]]}}}