Stop the war!
Остановите войну!
for scientists:
default search action
BibTeX record conf/acns/LinCLZZX10
@inproceedings{DBLP:conf/acns/LinCLZZX10, author = {Huang Lin and Zhenfu Cao and Xiaohui Liang and Muxin Zhou and Haojin Zhu and Dongsheng Xing}, editor = {Jianying Zhou and Moti Yung}, title = {How to Construct Interval Encryption from Binary Tree Encryption}, booktitle = {Applied Cryptography and Network Security, 8th International Conference, {ACNS} 2010, Beijing, China, June 22-25, 2010. Proceedings}, series = {Lecture Notes in Computer Science}, volume = {6123}, pages = {19--34}, year = {2010}, url = {https://doi.org/10.1007/978-3-642-13708-2\_2}, doi = {10.1007/978-3-642-13708-2\_2}, timestamp = {Thu, 23 Jun 2022 19:58:30 +0200}, biburl = {https://dblp.org/rec/conf/acns/LinCLZZX10.bib}, bibsource = {dblp computer science bibliography, https://dblp.org} }
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.