{"id":18570,"date":"2014-04-29T16:42:14","date_gmt":"2014-04-29T20:42:14","guid":{"rendered":"http:\/\/www.opensource.im\/?p=18570"},"modified":"2014-04-29T16:42:14","modified_gmt":"2014-04-29T20:42:14","slug":"hybrid-attribute-and-re-encryption-based-key-management-for-secure-and-scalable-mobile-applications-video","status":"publish","type":"post","link":"https:\/\/euvolution.com\/open-source-convergence\/encryption\/hybrid-attribute-and-re-encryption-based-key-management-for-secure-and-scalable-mobile-applications-video.php","title":{"rendered":"HYBRID ATTRIBUTE AND RE ENCRYPTION BASED KEY MANAGEMENT FOR SECURE AND SCALABLE MOBILE APPLICATIONS &#8211; Video"},"content":{"rendered":"<p><br \/>HYBRID ATTRIBUTE AND RE ENCRYPTION BASED KEY MANAGEMENT FOR SECURE AND SCALABLE MOBILE APPLICATIONS<br \/><span>Gagner Technologies offers M.E Projects based on IEEE 2013. Final Year Projects, M.E Projects 2014-2015, mini Projects 2014-2015, Real Time Projects, Final Year Projects for BE ECE, CSE, IT,...<\/span><span><\/p>\n<p>By: <\/span>Gagner Technologies<span style=\"color: #666666; font-size: 11px;\"<br \/><!-- Auto Generated --><\/p>\n<p>More:<br \/>\n<a target=\"_blank\" href=\"http:\/\/www.youtube.com\/watch?v=66QX0GL_wgM\" title=\"HYBRID ATTRIBUTE AND RE ENCRYPTION BASED KEY MANAGEMENT FOR SECURE AND SCALABLE MOBILE APPLICATIONS - Video\">HYBRID ATTRIBUTE AND RE ENCRYPTION BASED KEY MANAGEMENT FOR SECURE AND SCALABLE MOBILE APPLICATIONS - Video<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> HYBRID ATTRIBUTE AND RE ENCRYPTION BASED KEY MANAGEMENT FOR SECURE AND SCALABLE MOBILE APPLICATIONS Gagner Technologies offers M.E Projects based on IEEE 2013. Final Year Projects, M.E Projects 2014-2015, mini Projects 2014-2015, Real Time Projects, Final Year Projects for BE ECE, CSE, IT,... <\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[45],"tags":[],"class_list":["post-18570","post","type-post","status-publish","format-standard","hentry","category-encryption"],"_links":{"self":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/18570"}],"collection":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/comments?post=18570"}],"version-history":[{"count":0,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/posts\/18570\/revisions"}],"wp:attachment":[{"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/media?parent=18570"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/categories?post=18570"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/euvolution.com\/open-source-convergence\/wp-json\/wp\/v2\/tags?post=18570"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}