Last update: Sun Oct 15 02:37:19 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Lewko:2012:NPM,
author = "Allison Lewko and Brent Waters",
title = "New Proof Methods for Attribute-Based Encryption:
Achieving Full Security through Selective Techniques",
journal = j-LECT-NOTES-COMP-SCI,
volume = "7417",
pages = "180--198",
year = "2012",
CODEN = "LNCSD9",
DOI = "https://doi.org/10.1007/978-3-642-32009-5_12",
ISSN = "0302-9743 (print), 1611-3349 (electronic)",
ISSN-L = "0302-9743",
bibdate = "Wed Dec 19 15:22:07 MST 2012",
bibsource = "http://www.math.utah.edu/pub/tex/bib/lncs2012g.bib",
URL = "http://link.springer.com/chapter/10.1007/978-3-642-32009-5_12/",
acknowledgement = ack-nhfb,
book-DOI = "https://doi.org/10.1007/978-3-642-32009-5",
book-URL = "http://www.springerlink.com/content/978-3-642-32009-5",
fjournal = "Lecture Notes in Computer Science",
}
Related entries
- Attribute-Based,
7417(0)199
- Based, Attribute-,
7417(0)199
- Encryption,
7412(0)80,
7412(0)167,
7417(0)162,
7417(0)199,
7417(0)218,
7428(0)340
- Full,
7401(0)97,
7424(0)86
- Method,
7402(0)176,
7409(0)37,
7413(0)116,
7413(0)132,
7413(0)142,
7413(0)156,
7414(0)63,
7414(0)81,
7421(0)22,
7425(0)17,
7425(0)87,
7425(0)98,
7426(0)127,
7428(0)107,
7431(0)92,
7431(0)115,
7436(0)6,
7440(0)130,
7441(0)138,
7442(0)22
- New,
7408(0)1,
7408(0)218,
7413(0)116,
7414(0)71,
7414(0)81,
7422(0)19,
7425(0)49,
7440(0)130,
7441(0)154,
7442(0)34,
7447(0)88
- Proof,
7406(0)11,
7406(0)266,
7406(0)283,
7417(0)31,
7417(0)68,
7417(0)255,
7436(0)147
- Security,
7412(0)167,
7417(0)14,
7417(0)31,
7417(0)273,
7417(0)294,
7417(0)312,
7417(0)330,
7428(0)193,
7428(0)251,
7428(0)283,
7436(0)1,
7439(0)16,
7449(0)1,
7449(0)167,
7449(0)207
- Selective,
7439(0)56
- Technique,
7404(0)192,
7425(0)9,
7427(0)95,
7439(0)139
- through,
7411(0)99,
7430(0)102,
7436(0)10,
7438(0)215,
7440(0)40,
7443(0)78,
7444(0)156,
7446(0)161,
7447(0)1
- Waters, Brent,
7417(0)199,
7417(0)218