Li, J., Yu, Q., Zhang, Y., & Shen, J. (2019). Key-policy attribute-based encryption against continual auxiliary input leakage. Information sciences, 470, 175-188. https://doi.org/10.1016/j.ins.2018.07.077
Chicago Style (17th ed.) CitationLi, Jiguo, Qihong Yu, Yichen Zhang, and Jian Shen. "Key-policy Attribute-based Encryption Against Continual Auxiliary Input Leakage." Information Sciences 470 (2019): 175-188. https://doi.org/10.1016/j.ins.2018.07.077.
MLA (9th ed.) CitationLi, Jiguo, et al. "Key-policy Attribute-based Encryption Against Continual Auxiliary Input Leakage." Information Sciences, vol. 470, 2019, pp. 175-188, https://doi.org/10.1016/j.ins.2018.07.077.
Warning: These citations may not always be 100% accurate.