Figure1
![Towards a cryptography encyclopedia: a survey on attribute-based encryption](https://image.oaes.cc/44f8492e-bd44-4eec-844d-279d0dbe5678/jsss4030-1.jpg)
Figure 1. Example representation of an access policy as a tree, according to Priya et al. [13].
Figure 1. Example representation of an access policy as a tree, according to Priya et al. [13].
All published articles are preserved here permanently:
https://www.portico.org/publishers/oae/