{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T20:26:07Z","timestamp":1775075167464,"version":"3.50.1"},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/icc.2014.6883405","type":"proceedings-article","created":{"date-parts":[[2014,9,3]],"date-time":"2014-09-03T10:10:33Z","timestamp":1409739033000},"page":"725-730","source":"Crossref","is-referenced-by-count":130,"title":["Performance evaluation of Attribute-Based Encryption: Toward data privacy in the IoT"],"prefix":"10.1109","author":[{"given":"Xinlei","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jianqing","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Eve M.","family":"Schooler","sequence":"additional","affiliation":[]},{"given":"Mihaela","family":"Ion","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"195","article-title":"Attribute-based encryption with non-monotonic access structures","author":"ostrovsky","year":"2007","journal-title":"Proc of ACM CCS"},{"key":"22","first-page":"53","article-title":"Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization","author":"waters","year":"2011","journal-title":"Public Key Cryptography"},{"key":"17","first-page":"3","article-title":"Outsourcing the decryption of abe ciphertexts","author":"green","year":"2011","journal-title":"Proc of USENIX Security"},{"key":"23","first-page":"231","article-title":"A survey on attributebased encryption schemes of access control in cloud environments","volume":"15","author":"lee","year":"2013","journal-title":"International Journal of Network Security"},{"key":"18","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/978-3-642-34129-8_17","article-title":"Outsourcing encryption of attributebased encryption with mapreduce","author":"li","year":"2012","journal-title":"Information and Communications Security"},{"key":"24","author":"zheng","year":"2011","journal-title":"Privacy-Preserving Personal Health Record System Using Attribute-Based Encryption"},{"key":"15","first-page":"389","article-title":"On the security of 1024-bit rsa and 160-bit elliptic curve cryptography","author":"bos","year":"2009","journal-title":"IACR Cryptology ePrint Archive"},{"key":"16","year":"0","journal-title":"PowerTutor A Power Monitor for Android-Based Mobile Platforms"},{"key":"13","year":"0","journal-title":"Java Pairing Based Cryptography Library (JPBC)"},{"key":"14","first-page":"57","article-title":"Recommendation for key management-part 1: General (revision 3)","volume":"800","author":"barker","year":"2011","journal-title":"NIST Special Publication"},{"key":"11","author":"lynn","year":"2007","journal-title":"On the Implementation of Pairing-based Cryptosystems"},{"key":"12","author":"ion","year":"2013","journal-title":"Security of Publish\/Subscribe Systems"},{"key":"21","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/978-3-642-00843-6_2","article-title":"A ciphertext-policy attribute-based encryption scheme with constant ciphertext length","author":"emura","year":"2009","journal-title":"Information Security Practice and Experience"},{"key":"3","article-title":"The multicast group security architecture","author":"hardjono","year":"2004","journal-title":"RFC 3740 (Informational)"},{"key":"20","first-page":"20","article-title":"Distributed attributebased encryption","author":"mu?ller","year":"2009","journal-title":"Information Security and Cryptology"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/2486001.2491717"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/SmartGridComm.2012.6485986"},{"key":"10","author":"koblitz","year":"2005","journal-title":"Pairing-based Cryptography at High Security Levels"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/1866307.1866414"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462174"},{"key":"5","first-page":"321","article-title":"Ciphertext-policy attributebased encryption","author":"bethencourt","year":"2007","journal-title":"Proc s of the IEEE"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/TIFS.2011.2172209"},{"key":"8","doi-asserted-by":"crossref","first-page":"89","DOI":"10.1007\/978-3-642-16161-2_6","article-title":"Securing personal health records in cloud computing: Patient-centric and fine-grained data access control in multi-owner settings","author":"li","year":"2010","journal-title":"Security and Privacy in Communication Networks"}],"event":{"name":"ICC 2014 - 2014 IEEE International Conference on Communications","location":"Sydney, NSW","start":{"date-parts":[[2014,6,10]]},"end":{"date-parts":[[2014,6,14]]}},"container-title":["2014 IEEE International Conference on Communications (ICC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6878057\/6883277\/06883405.pdf?arnumber=6883405","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T15:50:13Z","timestamp":1498146613000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6883405\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/icc.2014.6883405","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}