{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T01:26:23Z","timestamp":1730251583983,"version":"3.28.0"},"reference-count":13,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,8]]},"DOI":"10.1109\/icnc.2014.6975982","type":"proceedings-article","created":{"date-parts":[[2014,12,10]],"date-time":"2014-12-10T16:45:28Z","timestamp":1418229928000},"page":"1033-1038","source":"Crossref","is-referenced-by-count":9,"title":["Multi-authority based weighted attribute encryption scheme in cloud computing"],"prefix":"10.1109","author":[{"given":"Yun","family":"Wang","sequence":"first","affiliation":[]},{"given":"Dalei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hong","family":"Zhong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2012.42"},{"key":"ref11","first-page":"44","article-title":"Ciphertext-Policy Weighted Attribute Based Encryption Scheme","volume":"47","author":"liu","year":"2013","journal-title":"Journal of Xi'an Jiaotong University"},{"key":"ref12","first-page":"21","article-title":"Ciphertext-policy Weighted Attribute-based Encryption Scheme in Cloud Computing","volume":"45","author":"liu","year":"2013","journal-title":"Journal of SiChuan University(Engineering Science Edition)"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(99)00070-8"},{"key":"ref4","first-page":"534","article-title":"Achieving secure, scalable, and finegrained data access control in cloud computing","author":"yu","year":"2010","journal-title":"Proceedings of IEEE Infocom"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1109\/SP.2007.11","article-title":"Ciphertext-policy attribute-based encryption","author":"bethencourt","year":"2007","journal-title":"Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P'07) IEEE Computer Society"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.78"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2010.203"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1653662.1653678"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70936-7_28"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref1","first-page":"457","article-title":"Fuzzy identity-based encryption","author":"sahai","year":"2005","journal-title":"Proceedings of the 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques Advances in Cryptology-EUROCRYPT'05"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567100"}],"event":{"name":"2014 10th International Conference on Natural Computation (ICNC)","start":{"date-parts":[[2014,8,19]]},"location":"Xiamen","end":{"date-parts":[[2014,8,21]]}},"container-title":["2014 10th International Conference on Natural Computation (ICNC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6963214\/6975799\/06975982.pdf?arnumber=6975982","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,10]],"date-time":"2017-08-10T20:42:20Z","timestamp":1502397740000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6975982\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,8]]},"references-count":13,"URL":"https:\/\/doi.org\/10.1109\/icnc.2014.6975982","relation":{},"subject":[],"published":{"date-parts":[[2014,8]]}}}