{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,6]],"date-time":"2024-07-06T07:15:39Z","timestamp":1720250139017},"reference-count":1,"publisher":"Walter de Gruyter GmbH","issue":"2","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,1]]},"DOI":"10.1515\/jmc.2011.009","type":"journal-article","created":{"date-parts":[[2011,8,3]],"date-time":"2011-08-03T06:04:39Z","timestamp":1312351479000},"source":"Crossref","is-referenced-by-count":11,"title":["Functional encryption for public-attribute inner products: Achieving constant-size ciphertexts with adaptive security or support for negation"],"prefix":"10.1515","volume":"5","author":[{"given":"Nuttapong","family":"Attrapadung","sequence":"first","affiliation":[]},{"given":"Beno\u00eet","family":"Libert","sequence":"additional","affiliation":[]}],"member":"374","reference":[{"key":"p_9","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398521"}],"container-title":["Journal of Mathematical Cryptology"],"original-title":[],"link":[{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/jmc.2011.009\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T01:19:08Z","timestamp":1619054348000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/document\/doi\/10.1515\/jmc.2011.009\/html"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1]]},"references-count":1,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1515\/jmc.2011.009","relation":{},"ISSN":["1862-2984","1862-2976"],"issn-type":[{"value":"1862-2984","type":"electronic"},{"value":"1862-2976","type":"print"}],"subject":[],"published":{"date-parts":[[2012,1]]}}}
  NODES