-
2
-
-
0037623983
-
Identity-based encryption from the weil pairing
-
Dan Boneh and Mathew Franklin, "Identity-based encryption from the Weil pairing", SIAM Journal of Computing (SICOMP), Volume 32, Pages 586-615, 2003.
-
(2003)
SIAM Journal of Computing (SICOMP)
, vol.32
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
3
-
-
23044483770
-
-
Editors: Ian F. Blake, Gadiel Seroussi and Nigel P. Smart, ", ", Cambridge University Press
-
Editors: Ian F. Blake, Gadiel Seroussi and Nigel P. Smart, "Advances in elliptic curve cryptography", Cambridge University Press, 2005.
-
(2005)
Advances in Elliptic Curve Cryptography
-
-
-
4
-
-
33745854208
-
Chosen- ciphertext security from identity-based encryption
-
D. Boneh, R. Canetti, S. Halevi, and J. Katz, "Chosen- Ciphertext Security from Identity-Based Encryption", SIAM Journal of Computing (SICOMP), Volume 36, Issue 5, Pages 915-942, 2006.
-
(2006)
SIAM Journal of Computing (SICOMP)
, vol.36
, Issue.5
, pp. 915-942
-
-
Boneh, D.1
Canetti, R.2
Halevi, S.3
Katz, J.4
-
5
-
-
33745166648
-
Collusion resistant broadcast encryption with short ciphertexts and private keys
-
Advances in Cryptology - CRYPTO 2005 - 25th Annual International Cryptology Conference, Proceedings
-
Dan Boneh, Craig Gentry and Brent Waters, "Collusion resistant broadcast encryption with short ciphertexts and private keys", In Advances in Cryptology-CRYPTO'05, LNCS, Volume 3621, Pages 258-275, 2005. (Pubitemid 43902118)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
6
-
-
14844297757
-
Concealing complex policies with hidden credentials
-
Robert W. Bradshaw, Jason E. Holt, and Kent E. Seamons, "Concealing complex policies with hidden credentials", Proceedings of 11th ACM Conference on Computer and Communications Security (CCS'04), Pages 146-157, 2004.
-
(2004)
Proceedings of 11th ACM Conference on Computer and Communications Security (CCS'04)
, pp. 146-157
-
-
Bradshaw, R.W.1
Holt, J.E.2
Seamons, K.E.3
-
7
-
-
0035791053
-
Securing context-aware applications using environment roles
-
M. J. Covington, W. Long, S. Srinivasan, A. Dey, M. Ahamad and G. Abowd, "Securing context-aware applications using environment roles", Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (ACMT'01), 2001.
-
(2001)
Proceedings of the 6th ACM Symposium on Access Control Models and Technologies (ACMT'01)
-
-
Covington, M.J.1
Long, W.2
Srinivasan, S.3
Dey, A.4
Ahamad, M.5
Abowd, G.6
-
8
-
-
14844297376
-
Idbased encryption for complex hierarchies with applications to forward security and broadcast encryption
-
Y. Dodis, N. Fazio, A. Lysyanskaya, and D.F. Yao, "IDBased Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption", Proceedings of 11th ACM Conference on Computer and Communications Security (CCS'04), Pages 354-363, 2004.
-
(2004)
Proceedings of 11th ACM Conference on Computer and Communications Security (CCS'04)
, pp. 354-363
-
-
Dodis, Y.1
Fazio, N.2
Lysyanskaya, A.3
Yao, D.F.4
-
11
-
-
84994391858
-
Role-based access control on the web
-
Joon S. Park, Ravi Sandhu and Gail-Joon Ahn, "Role-based access control on the web", ACM Transactions on Information and System Security (TISSEC'01), Volume 4, Pages 37- 71, 2001.
-
(2001)
ACM Transactions on Information and System Security (TISSEC'01)
, vol.4
, pp. 37-71
-
-
Park, J.S.1
Sandhu, R.2
Ahn, G.-J.3
-
14
-
-
34547325357
-
Secure attribute-based systems
-
November
-
Matthew Pirretti, Patrick Traynor, Patrick McDaniel and Brent Waters, "Secure Attribute-Based Systems", Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS'06), Pages 99-112, November 2006.
-
(2006)
Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS'06)
, pp. 99-112
-
-
Pirretti, M.1
Traynor, P.2
Mcdaniel, P.3
Waters, B.4
-
15
-
-
24944554962
-
Fuzzy identity based encryption
-
LNCS, Springer-Verlag
-
Amit Sahai and Brent Waters, "Fuzzy identity based encryption", Advances in Cryptology-EUROCRYPT'05, LNCS, Volume 3494, Pages 457473, Springer-Verlag, 2005.
-
(2005)
Advances in Cryptology-EUROCRYPT'05
, vol.3494
, pp. 457473
-
-
Sahai, A.1
Waters, B.2
-
16
-
-
0030086382
-
Role-based access control models
-
Ravi S. Sandhu, Edward J. Coynek, Hal L. Feinsteink and Charles E. Youmank, "Role-Based Access Control Models", IEEE Computer, Volume 29, Pages 38-47, 1996.
-
(1996)
IEEE Computer
, vol.29
, pp. 38-47
-
-
Sandhu, R.S.1
Coynek, E.J.2
Feinsteink, H.L.3
Youmank, C.E.4
|