{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T09:04:48Z","timestamp":1725959088070},"reference-count":0,"publisher":"Inderscience Publishers","issue":"3","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IJACT"],"published-print":{"date-parts":[[2012]]},"DOI":"10.1504\/ijact.2012.045587","type":"journal-article","created":{"date-parts":[[2012,2,28]],"date-time":"2012-02-28T12:30:35Z","timestamp":1330432235000},"page":"250","source":"Crossref","is-referenced-by-count":22,"title":["Attribute-based encryption without key cloning"],"prefix":"10.1504","volume":"2","author":[{"given":"M. Jason","family":"Hinek","sequence":"first","affiliation":[]},{"given":"Shaoquan","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Reihaneh Safavi","family":"Naini","sequence":"additional","affiliation":[]},{"given":"Siamak F.","family":"Shahandashti","sequence":"additional","affiliation":[]}],"member":"378","container-title":["International Journal of Applied Cryptography"],"original-title":[],"language":"en","deposited":{"date-parts":[[2012,2,28]],"date-time":"2012-02-28T12:31:30Z","timestamp":1330432290000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.inderscience.com\/link.php?id=45587"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"references-count":0,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2012]]}},"URL":"https:\/\/doi.org\/10.1504\/ijact.2012.045587","relation":{},"ISSN":["1753-0563","1753-0571"],"issn-type":[{"value":"1753-0563","type":"print"},{"value":"1753-0571","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012]]}}}