Research Article

Multi-Authority Criteria-Based Encryption Scheme for IoT

Figure 1

The example of access policy.