{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T10:46:58Z","timestamp":1730198818120,"version":"3.28.0"},"reference-count":23,"publisher":"IEEE","license":[{"start":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T00:00:00Z","timestamp":1692057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,15]],"date-time":"2023-08-15T00:00:00Z","timestamp":1692057600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100020950","name":"National Science and Technology Council","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100020950","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023,8,15]]},"DOI":"10.1109\/asiajcis60284.2023.00015","type":"proceedings-article","created":{"date-parts":[[2023,12,29]],"date-time":"2023-12-29T19:29:34Z","timestamp":1703878174000},"page":"25-31","source":"Crossref","is-referenced-by-count":0,"title":["A Novel Ciphertext-Policy Attribute-Based Encryption Supporting Dual Membership"],"prefix":"10.1109","author":[{"given":"Yi-Fan","family":"Tseng","sequence":"first","affiliation":[{"name":"National Chengchi University,Department of Computer Science,Taipei,Taiwan"}]},{"given":"Jheng-Jia","family":"Huang","sequence":"additional","affiliation":[{"name":"National Taiwan University of Science and Technology,Department of Information Management,Taipei,Taiwan"}]},{"given":"Guan-Yu","family":"Chen","sequence":"additional","affiliation":[{"name":"National Taiwan University of Science and Technology,Department of Information Management,Taipei,Taiwan"}]},{"given":"Wei-Hsueh","family":"Wang","sequence":"additional","affiliation":[{"name":"National Taiwan University of Science and Technology,Department of Information Management,Taipei,Taiwan"}]},{"given":"Yi-Hsueh","family":"Lu","sequence":"additional","affiliation":[{"name":"National Chengchi University,Department of Computer Science,Taipei,Taiwan"}]},{"given":"Wen-Yi","family":"Chen","sequence":"additional","affiliation":[{"name":"National Chengchi University,Department of Computer Science,Taipei,Taiwan"}]},{"given":"Shih-Pei","family":"Kao","sequence":"additional","affiliation":[{"name":"National Chengchi University,Department of Computer Science,Taipei,Taiwan"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/11426639_27"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-39568-7_2"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10207-023-00690-2"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2022.3154039"},{"key":"ref6","doi-asserted-by":"crossref","DOI":"10.21203\/rs.3.rs-2639473\/v1","article-title":"Chebyshev chaotic map with attribute based encryption on session based data sharing in fog environment","author":"A","year":"2023"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-021-03382-5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-021-03867-5"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/JSYST.2021.3064356"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-19379-8_4"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1186\/s13677-023-00414-w"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2022.03.081"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111271"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.seta.2022.102556"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/JBHI.2021.3075995"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.2986303"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180418"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.csi.2022.103698"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2022.06.028"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/s10623-021-00939-8"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2020.2986620"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-14791-3_7"},{"key":"ref23","first-page":"538","article-title":"Supporting non-membership proofs with bilinear-map accumulators","volume":"2008","author":"Damg\u0227rd","year":"2008","journal-title":"IACR Cryptology ePrint Archive"}],"event":{"name":"2023 18th Asia Joint Conference on Information Security (AsiaJCIS)","start":{"date-parts":[[2023,8,15]]},"location":"Koganei, Japan","end":{"date-parts":[[2023,8,16]]}},"container-title":["2023 18th Asia Joint Conference on Information Security (AsiaJCIS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10367786\/10367877\/10367902.pdf?arnumber=10367902","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T00:57:56Z","timestamp":1705107476000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10367902\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8,15]]},"references-count":23,"URL":"https:\/\/doi.org\/10.1109\/asiajcis60284.2023.00015","relation":{},"subject":[],"published":{"date-parts":[[2023,8,15]]}}}