IET
IET Information Security
Practical Approaches to Secure Computation
Cryptology

Abdalla, M., Kiltz, E., & Neven, G. (2008). Generalized Key Delegation for Hierarchical Identity-Based Encryption. IET Information Security, 2(3), 67–78.