Tsz Hon Yuen, Ye Zhang, Siu-Ming Yiu, Joseph K. Liu. Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks. In Miroslaw Kutylowski, Jaideep Vaidya, editors, Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I. Volume 8712 of Lecture Notes in Computer Science, pages 130-147, Springer, 2014. [doi]
@inproceedings{YuenZYL14, title = {Identity-Based Encryption with Post-Challenge Auxiliary Inputs for Secure Cloud Applications and Sensor Networks}, author = {Tsz Hon Yuen and Ye Zhang and Siu-Ming Yiu and Joseph K. Liu}, year = {2014}, doi = {10.1007/978-3-319-11203-9_8}, url = {http://dx.doi.org/10.1007/978-3-319-11203-9_8}, researchr = {https://researchr.org/publication/YuenZYL14}, cites = {0}, citedby = {0}, pages = {130-147}, booktitle = {Computer Security - ESORICS 2014 - 19th European Symposium on Research in Computer Security, Wroclaw, Poland, September 7-11, 2014. Proceedings, Part I}, editor = {Miroslaw Kutylowski and Jaideep Vaidya}, volume = {8712}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-319-11202-2}, }