Attribute‐Key Attack Against a Class of Key Generation Algorithm Frameworks

ABSTRACT Attribute‐based encryption (ABE) schemes are widely used for access control of ciphertext in cloud computing. Research on the ability of existing ABE schemes to resist multiple attacks, such as attribute‐key attacks, master‐key attacks, decryption attacks, and so forth, can prevent insecure...

Full description

Saved in:
Bibliographic Details
Published inConcurrency and computation Vol. 37; no. 21-22
Main Authors Sun, Keshuo, Gao, Haiying, Hu, Bin, Zhou, Aoyang, Zhao, Xiufeng
Format Journal Article
LanguageEnglish
Published Hoboken, USA John Wiley & Sons, Inc 25.09.2025
Wiley Subscription Services, Inc
Subjects
Online AccessGet full text
ISSN1532-0626
1532-0634
DOI10.1002/cpe.70222

Cover

Abstract ABSTRACT Attribute‐based encryption (ABE) schemes are widely used for access control of ciphertext in cloud computing. Research on the ability of existing ABE schemes to resist multiple attacks, such as attribute‐key attacks, master‐key attacks, decryption attacks, and so forth, can prevent insecure schemes from being used. This paper summarizes the framework of a class of key generation algorithms in ABE schemes, called Key generation algorithm Under Encoding (KUE) model, based on which we propose the prerequisites for the success of attribute‐key attack. We implement the attribute‐key attack for two typical ciphertext‐policy attribute encryption schemes that fit the KUE model, and reveal the security flaws of the schemes through specific attack examples, which further confirm the practical feasibility of the attack under the KUE model. At last, two countermeasures are proposed against such attacks, providing valuable insights for the design of secure ABE schemes.
AbstractList Attribute‐based encryption (ABE) schemes are widely used for access control of ciphertext in cloud computing. Research on the ability of existing ABE schemes to resist multiple attacks, such as attribute‐key attacks, master‐key attacks, decryption attacks, and so forth, can prevent insecure schemes from being used. This paper summarizes the framework of a class of key generation algorithms in ABE schemes, called Key generation algorithm Under Encoding (KUE) model, based on which we propose the prerequisites for the success of attribute‐key attack. We implement the attribute‐key attack for two typical ciphertext‐policy attribute encryption schemes that fit the KUE model, and reveal the security flaws of the schemes through specific attack examples, which further confirm the practical feasibility of the attack under the KUE model. At last, two countermeasures are proposed against such attacks, providing valuable insights for the design of secure ABE schemes.
ABSTRACT Attribute‐based encryption (ABE) schemes are widely used for access control of ciphertext in cloud computing. Research on the ability of existing ABE schemes to resist multiple attacks, such as attribute‐key attacks, master‐key attacks, decryption attacks, and so forth, can prevent insecure schemes from being used. This paper summarizes the framework of a class of key generation algorithms in ABE schemes, called Key generation algorithm Under Encoding (KUE) model, based on which we propose the prerequisites for the success of attribute‐key attack. We implement the attribute‐key attack for two typical ciphertext‐policy attribute encryption schemes that fit the KUE model, and reveal the security flaws of the schemes through specific attack examples, which further confirm the practical feasibility of the attack under the KUE model. At last, two countermeasures are proposed against such attacks, providing valuable insights for the design of secure ABE schemes.
Author Zhou, Aoyang
Zhao, Xiufeng
Sun, Keshuo
Gao, Haiying
Hu, Bin
Author_xml – sequence: 1
  givenname: Keshuo
  surname: Sun
  fullname: Sun, Keshuo
  organization: Information Engineering University
– sequence: 2
  givenname: Haiying
  orcidid: 0009-0008-4493-7694
  surname: Gao
  fullname: Gao, Haiying
  email: xdgaohaiying@163.com
  organization: Information Engineering University
– sequence: 3
  givenname: Bin
  surname: Hu
  fullname: Hu, Bin
  organization: Information Engineering University
– sequence: 4
  givenname: Aoyang
  surname: Zhou
  fullname: Zhou, Aoyang
  organization: Information Engineering University
– sequence: 5
  givenname: Xiufeng
  surname: Zhao
  fullname: Zhao, Xiufeng
  organization: Information Engineering University
BookMark eNp1kMFOwzAMhiM0JLbBgTeIxIlDt8Rp2u5YVdtADMEBzlHaJqNb14wk09Qbj8Az8iR0FHHjZFv-7N_-R2jQmEYhdE3JhBIC02KvJjEBgDM0pJxBQCIWDv5yiC7QyLkNIZQSRofoMfXeVvnBq6-PzwfV4q6WxRana1k1zmOJs1o6h43Gp-5SNcpKX5kGp_Xa2Mq_7fDCyp06Grt1l-hcy9qpq984Rq-L-Ut2F6yelvdZugoK4DMIdJSXRRmXLOe5TIgsYx7GwGUS5SQsCPCIKKrZLAlDkDLRSZ6AljEvIwhVdzYbo5t-796a94NyXmzMwTadpGAQAos47_4eo9ueKqxxziot9rbaSdsKSsTJLdG5JX7c6thpzx6rWrX_gyJ7nvcT341ZbOY
Cites_doi 10.1109/ACCESS.2018.2854600
10.1109/TC.2020.3043950
10.1007/978-3-030-75539-3_5
10.1109/TCC.2021.3131686
10.1109/TPDS.2012.97
10.1109/JIOT.2024.3468018
10.1109/TCC.2015.2513388
10.1109/TETC.2019.2904637
10.1109/TPDS.2015.2448095
10.1109/JIOT.2023.3325996
10.1007/11426639_27
10.1007/s10207-014-0270-9
10.1109/TIFS.2016.2523941
10.1109/SP.2007.11
10.1109/TDSC.2020.2977646
10.1007/s11227-018-2644-7
10.1109/SCT.1993.336536
10.1109/JIOT.2021.3137240
ContentType Journal Article
Copyright 2025 John Wiley & Sons Ltd.
Copyright_xml – notice: 2025 John Wiley & Sons Ltd.
DBID AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
DOI 10.1002/cpe.70222
DatabaseName CrossRef
Computer and Information Systems Abstracts
Technology Research Database
ProQuest Computer Science Collection
Advanced Technologies Database with Aerospace
Computer and Information Systems Abstracts – Academic
Computer and Information Systems Abstracts Professional
DatabaseTitle CrossRef
Computer and Information Systems Abstracts
Technology Research Database
Computer and Information Systems Abstracts – Academic
Advanced Technologies Database with Aerospace
ProQuest Computer Science Collection
Computer and Information Systems Abstracts Professional
DatabaseTitleList Computer and Information Systems Abstracts
CrossRef

DeliveryMethod fulltext_linktorsrc
Discipline Computer Science
EISSN 1532-0634
EndPage n/a
ExternalDocumentID 10_1002_cpe_70222
CPE70222
Genre researchArticle
GrantInformation_xml – fundername: National Natural Science Foundation of China
  funderid: 61902428
– fundername: the fund of Laboratory for Advanced Computing and Intelligence Engineering
GroupedDBID .3N
.DC
.GA
05W
0R~
10A
1L6
1OB
1OC
33P
3SF
3WU
4.4
50Y
50Z
51W
51X
52M
52N
52O
52P
52S
52T
52U
52W
52X
5GY
5VS
66C
702
7PT
8-0
8-1
8-3
8-4
8-5
8UM
930
A03
AAESR
AAEVG
AAHQN
AAMNL
AANLZ
AAONW
AAXRX
AAYCA
AAZKR
ABCQN
ABCUV
ABEML
ABIJN
ACAHQ
ACCZN
ACPOU
ACSCC
ACXBN
ACXQS
ADBBV
ADEOM
ADIZJ
ADKYN
ADMGS
ADOZA
ADXAS
ADZMN
AEIGN
AEIMD
AEUYR
AEYWJ
AFBPY
AFFPM
AFGKR
AFWVQ
AGHNM
AGYGG
AHBTC
AITYG
AIURR
AJXKR
ALMA_UNASSIGNED_HOLDINGS
ALUQN
ALVPJ
AMBMR
AMYDB
ATUGU
AUFTA
AZBYB
BAFTC
BDRZF
BFHJK
BHBCM
BMNLL
BROTX
BRXPI
BY8
CS3
D-E
D-F
DCZOG
DPXWK
DR2
DRFUL
DRSTM
EBS
F00
F01
F04
F5P
G-S
G.N
GNP
GODZA
HGLYW
HHY
HZ~
IX1
JPC
KQQ
LATKE
LAW
LC2
LC3
LEEKS
LITHE
LOXES
LP6
LP7
LUTES
LYRES
MEWTI
MK4
MRFUL
MRSTM
MSFUL
MSSTM
MXFUL
MXSTM
N04
N05
N9A
O66
O9-
OIG
P2W
P2X
P4D
PQQKQ
Q.N
Q11
QB0
QRW
R.K
ROL
RX1
SUPJJ
TN5
UB1
V2E
W8V
W99
WBKPD
WIH
WIK
WOHZO
WQJ
WXSBR
WYISQ
WZISG
XG1
XV2
~IA
~WT
AAYXX
CITATION
7SC
8FD
JQ2
L7M
L~C
L~D
ID FETCH-LOGICAL-c2592-f6bdcd7d3b5ba80ad754725a86b04c02560e1f398442aa8f8b82fa75d624e0313
IEDL.DBID DR2
ISSN 1532-0626
IngestDate Sat Aug 23 15:40:22 EDT 2025
Wed Oct 01 05:37:35 EDT 2025
Sat Aug 23 09:20:08 EDT 2025
IsPeerReviewed true
IsScholarly true
Issue 21-22
Language English
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-c2592-f6bdcd7d3b5ba80ad754725a86b04c02560e1f398442aa8f8b82fa75d624e0313
Notes ObjectType-Article-1
SourceType-Scholarly Journals-1
ObjectType-Feature-2
content type line 14
ORCID 0009-0008-4493-7694
PQID 3242365506
PQPubID 2045170
PageCount 11
ParticipantIDs proquest_journals_3242365506
crossref_primary_10_1002_cpe_70222
wiley_primary_10_1002_cpe_70222_CPE70222
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 25 September 2025
2025-09-25
20250925
PublicationDateYYYYMMDD 2025-09-25
PublicationDate_xml – month: 09
  year: 2025
  text: 25 September 2025
  day: 25
PublicationDecade 2020
PublicationPlace Hoboken, USA
PublicationPlace_xml – name: Hoboken, USA
– name: Hoboken
PublicationTitle Concurrency and computation
PublicationYear 2025
Publisher John Wiley & Sons, Inc
Wiley Subscription Services, Inc
Publisher_xml – name: John Wiley & Sons, Inc
– name: Wiley Subscription Services, Inc
References 2021; 9
2019; 7
2023; 21
2018; 9
2015; 14
2021; 12704
2023; 11
2022; 71
2013; 24
2022; 9
2007
2024; 11
1993
2025; 13
2020; 76
2025; 12
2016; 27
2005; 3494
2022; 19
2016; 11
e_1_2_10_12_1
e_1_2_10_9_1
e_1_2_10_13_1
e_1_2_10_10_1
e_1_2_10_21_1
e_1_2_10_20_1
Wen W. (e_1_2_10_19_1) 2025; 13
e_1_2_10_2_1
e_1_2_10_4_1
e_1_2_10_18_1
e_1_2_10_3_1
e_1_2_10_6_1
e_1_2_10_16_1
e_1_2_10_5_1
e_1_2_10_17_1
e_1_2_10_8_1
e_1_2_10_14_1
e_1_2_10_7_1
Miao Y. (e_1_2_10_11_1) 2023; 21
e_1_2_10_15_1
References_xml – volume: 11
  start-page: 1265
  issue: 6
  year: 2016
  end-page: 1277
  article-title: An Efficient File Hierarchy Attribute‐Based Encryption Scheme in Cloud Computing
  publication-title: IEEE Transactions on Information Forensics and Security
– volume: 11
  start-page: 10441
  issue: 6
  year: 2024
  end-page: 10451
  article-title: Efficient Revocable Attribute‐Based Encryption With Verifiable Data Integrity
  publication-title: IEEE Internet of Things Journal
– start-page: 321
  year: 2007
  end-page: 334
– volume: 21
  start-page: 1
  year: 2023
  end-page: 18
  article-title: Verifiable Outsourced Attribute‐Based Encryption Scheme for Cloud‐Assisted Mobile E‐health System
  publication-title: IEEE Transactions on Dependable and Secure Computing
– volume: 24
  start-page: 131
  issue: 1
  year: 2013
  end-page: 143
  article-title: Scalable and Secure Sharing of Personal Health Records in Cloud Computing Using Attribute‐Based Encryption
  publication-title: IEEE Transactions on Parallel and Distributed Systems
– volume: 12
  start-page: 2146
  issue: 2
  year: 2025
  end-page: 2157
  article-title: PH‐MG‐ABE: A Flexible Policy‐Hidden Multigroup Attribute‐Based Encryption Scheme for Secure Cloud Storage
  publication-title: IEEE Internet of Things Journal
– volume: 14
  start-page: 487
  issue: 6
  year: 2015
  end-page: 497
  article-title: Privacy‐Preserving Personal Health Record Using Multi‐authority Attribute‐based Encryption With Revocation
  publication-title: International Journal of Information Security
– volume: 9
  start-page: 983
  issue: 2
  year: 2021
  end-page: 993
  article-title: Extended File Hierarchy Access Control Scheme With Attribute‐Based Encryption in Cloud Computing
  publication-title: IEEE Transactions on Emerging Topics in Computing
– volume: 13
  start-page: 1
  year: 2025
  end-page: 13
  article-title: Efficient Registered Attribute Based Access Control With Same Sub‐Policies in Mobile Cloud Computing
  publication-title: IEEE Transactions on Mobile Computing
– volume: 12704
  start-page: 100
  year: 2021
  end-page: 125
– volume: 9
  start-page: 38273
  issue: 6
  year: 2018
  end-page: 38284
  article-title: Efficient Compressed Ciphertext Length Scheme Using Multi‐Authority CP‐ABE for Hierarchical Attributes
  publication-title: IEEE Access
– volume: 71
  start-page: 175
  issue: 1
  year: 2022
  end-page: 184
  article-title: Efficient CP‐ABE Scheme With Shared Decryption in Cloud Storage
  publication-title: IEEE Transactions on Computers
– volume: 27
  start-page: 1484
  issue: 5
  year: 2016
  end-page: 1496
  article-title: TMACS: A Robust and Verifiable Threshold Multi‐Authority Access Control System in Public Cloud Storage
  publication-title: IEEE Transactions on Parallel and Distributed Systems
– volume: 7
  start-page: 383
  issue: 2
  year: 2019
  end-page: 391
  article-title: A Modified Hierarchical Attribute‐Based Encryption Access Control Method for Mobile Cloud Computing
  publication-title: IEEE Transactions on Cloud Computing
– volume: 3494
  start-page: 457
  year: 2005
  end-page: 473
– volume: 11
  start-page: 1273
  issue: 2
  year: 2023
  end-page: 1285
  article-title: Efficient Revocable Storage Attribute‐based Encryption With Arithmetic Span Programs in Cloud‐Assisted Internet of Things
  publication-title: IEEE Transactions on Cloud Computing
– volume: 9
  start-page: 12482
  issue: 14
  year: 2022
  end-page: 12496
  article-title: Secure Decentralized Attribute‐Based Sharing of Personal Health Records With Blockchain
  publication-title: IEEE Internet of Things Journal
– start-page: 102
  year: 1993
  end-page: 111
– volume: 19
  start-page: 316
  issue: 1
  year: 2022
  end-page: 327
  article-title: A Traceable and Revocable Ciphertext‐Policy Attribute‐Based Encryption Scheme Based on Privacy Protection
  publication-title: IEEE Transactions on Dependable and Secure Computing
– volume: 76
  start-page: 4884
  issue: 7
  year: 2020
  end-page: 4903
  article-title: An Attribute‐Based Encryption Scheme With Multiple Authorities on Hierarchical Personal Health Record in Cloud
  publication-title: Journal of Supercomputing
– ident: e_1_2_10_13_1
  doi: 10.1109/ACCESS.2018.2854600
– ident: e_1_2_10_16_1
  doi: 10.1109/TC.2020.3043950
– ident: e_1_2_10_20_1
  doi: 10.1007/978-3-030-75539-3_5
– ident: e_1_2_10_7_1
  doi: 10.1109/TCC.2021.3131686
– ident: e_1_2_10_8_1
  doi: 10.1109/TPDS.2012.97
– ident: e_1_2_10_18_1
  doi: 10.1109/JIOT.2024.3468018
– ident: e_1_2_10_5_1
  doi: 10.1109/TCC.2015.2513388
– ident: e_1_2_10_15_1
  doi: 10.1109/TETC.2019.2904637
– ident: e_1_2_10_4_1
  doi: 10.1109/TPDS.2015.2448095
– ident: e_1_2_10_17_1
  doi: 10.1109/JIOT.2023.3325996
– ident: e_1_2_10_2_1
  doi: 10.1007/11426639_27
– ident: e_1_2_10_9_1
  doi: 10.1007/s10207-014-0270-9
– ident: e_1_2_10_12_1
  doi: 10.1109/TIFS.2016.2523941
– ident: e_1_2_10_3_1
  doi: 10.1109/SP.2007.11
– ident: e_1_2_10_6_1
  doi: 10.1109/TDSC.2020.2977646
– volume: 21
  start-page: 1
  year: 2023
  ident: e_1_2_10_11_1
  article-title: Verifiable Outsourced Attribute‐Based Encryption Scheme for Cloud‐Assisted Mobile E‐health System
  publication-title: IEEE Transactions on Dependable and Secure Computing
– ident: e_1_2_10_14_1
  doi: 10.1007/s11227-018-2644-7
– ident: e_1_2_10_21_1
  doi: 10.1109/SCT.1993.336536
– volume: 13
  start-page: 1
  year: 2025
  ident: e_1_2_10_19_1
  article-title: Efficient Registered Attribute Based Access Control With Same Sub‐Policies in Mobile Cloud Computing
  publication-title: IEEE Transactions on Mobile Computing
– ident: e_1_2_10_10_1
  doi: 10.1109/JIOT.2021.3137240
SSID ssj0011031
Score 2.4085217
Snippet ABSTRACT Attribute‐based encryption (ABE) schemes are widely used for access control of ciphertext in cloud computing. Research on the ability of existing ABE...
Attribute‐based encryption (ABE) schemes are widely used for access control of ciphertext in cloud computing. Research on the ability of existing ABE schemes...
SourceID proquest
crossref
wiley
SourceType Aggregation Database
Index Database
Publisher
SubjectTerms Access control
Algorithms
attribute‐based encryption
attribute‐key attack
Cloud computing
Countermeasures
Encryption
KUE model
Title Attribute‐Key Attack Against a Class of Key Generation Algorithm Frameworks
URI https://onlinelibrary.wiley.com/doi/abs/10.1002%2Fcpe.70222
https://www.proquest.com/docview/3242365506
Volume 37
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
journalDatabaseRights – providerCode: PRVWIB
  databaseName: Wiley Online Library - Core collection (SURFmarket)
  issn: 1532-0626
  databaseCode: DR2
  dateStart: 19960101
  customDbUrl:
  isFulltext: true
  eissn: 1532-0634
  dateEnd: 99991231
  omitProxy: false
  ssIdentifier: ssj0011031
  providerName: Wiley-Blackwell
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1NS8MwGA5jJy_OT5xOCeLBS7c2S5oUT2NsDGUi4mAHoSRNOoe6ja076Mmf4G_0l5iPdlNBEG8t_aB937zJ87TJ8wBwxrAQPJDcC1JCPcwQ9zQKQR4WUSCJFDQSZr1z_zrsDfDlkAxL4KJYC-P0IVYf3Exl2P7aFDgXi8ZaNDSZqTo1dEX3v0EztHTqdiUdFRj7AqeVijxfo_ZCVchHjdWV38eiNcD8ClPtONOtgPviCd30ksf6MhP15PWHeOM_X2ELbOb4E7Zcg9kGJTXZAZXC2wHmpb4L-q3MeWGpj7f3K_UC9T5PHmFrxMcaUUIOrZ0mnKbQHHXq1SbJsPU0ms7H2cMz7BYTvxZ7YNDt3LV7Xm694CWaDyEvDYVMJJVNQQRnPpeUYIoIZ6HwcWJxkgrSZsQwRpyzlAmGUk6JDBFWRg5yH5Qn04k6AFBqTBpoVBRRgTAPE65Tg4RCmnj5KuG0Ck6LJMQzp7AROy1lFOsAxTZAVVAr0hPnRbaILRYMNcUKq-Dcxvn3G8Ttm47dOPz7qUdgAxm3X_MPitRAOZsv1bGGIJk4sW3tE0XQ1n8
linkProvider Wiley-Blackwell
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnZ3PS8MwFMcfcx704m9xOjWIBy-dbZY2LXgp4pi6DZENdpGSNOkUdRtbPejJP8G_0b_EJG3nDxDEW0t_0L6X13xemnwfwKFPOGeOYJaTuNQiPmaWohBsER44whWcBlyvd253vGaPXPTdfglOirUwmT7EbMBNR4b5XusA1wPSx5-qofFY1qjOV-ZgnngqT9FIdD0Tj3J0AYNMLRVbtuL2QlfIxsezS7_3Rp-I-RVUTU_TWIab4hmzCSb3taeU1-KXH_KN_32JFVjKERSFWZtZhZIcrsFyUd4B5dG-Du0wzcphyffXt0v5jNQ-i-9ROGB3CioRQ6aiJholSB_NBKy1n1H4MBhN7tLbR9Qo5n5NN6DXOOueNq28-oIVq5QIW4nHRSyoqHOXM99mgrqEYpf5HrdJbFBJOkk98AnBjPmJz32cMOoKDxOpFSE3oTwcDeUWIKGw1FFgFFCOCfNipnyDucQq97JlzGgFDgovRONMZCPK5JRxpAwUGQNVoFr4J8rjbBoZHPRUluVV4MgY-vcbRKdXZ2Zj---n7sNCs9tuRa3zzuUOLGJd_Ff_knKrUE4nT3JXEUnK90zD-wDHuNqg
linkToPdf http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1bS8MwFD7oBPHFecV5DeKDL51tljQp-DLUMa8MUfBFStKkc0y3od2DPvkT_I3-EpN0nRcQxLeWJqU9J6f5TnryfQA7nEgpAiW8IKXMIxwLz6AQ7BEZBYoqySJp9zufX4TNa3JyQ28mYL_YC5PzQ4wX3GxkuO-1DXA9UOneJ2toMtBVZvOVSZgiNOK2oO_wckweFVgBg5wtFXu-we0Fr5CP98Zdv89GnxDzK1B1M02jDLfFM-YFJt3qMJPV5OUHfeN_X2IOZkcQFNXzMTMPE7q3AOVC3gGNon0RzutZLoel31_fTvUzMuci6aJ6W3QMqEQCOUVN1E-RvZoTWFs_o_p9u__Yye4eUKOo_XpaguvG0dVB0xupL3iJSYmwl4ZSJYqpmqRScF8oRgnDVPBQ-iRxUEkHaS3ihGAheMolx6lgVIWYaMsIuQylXr-nVwApA0sDA4wiJjERYSKMb7DU2ORevk4Eq8B24YV4kJNsxDmdMo6NgWJnoAqsF_6JR3H2FDs4GJosK6zArjP07zeID1pH7mD17023YLp12IjPji9O12AGW-1f-0eKrkMpexzqDQNIMrnpxt0HoozaJA
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=Attribute%E2%80%90Key+Attack+Against+a+Class+of+Key+Generation+Algorithm+Frameworks&rft.jtitle=Concurrency+and+computation&rft.au=Sun%2C+Keshuo&rft.au=Gao%2C+Haiying&rft.au=Hu%2C+Bin&rft.au=Zhou%2C+Aoyang&rft.date=2025-09-25&rft.pub=John+Wiley+%26+Sons%2C+Inc&rft.issn=1532-0626&rft.eissn=1532-0634&rft.volume=37&rft.issue=21-22&rft.epage=n%2Fa&rft_id=info:doi/10.1002%2Fcpe.70222&rft.externalDBID=10.1002%252Fcpe.70222&rft.externalDocID=CPE70222
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=1532-0626&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=1532-0626&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=1532-0626&client=summon