-
1
-
-
77952783550
-
A privacy-preserving approach to policy-based content dissemination
-
N. Shang, M. Nabeel, F. Paci, and E. Bertino, "A Privacy-Preserving Approach to Policy-Based Content Dissemination," Proc. IEEE 26th Int'l Conf. Data Eng. (ICDE '10), 2010.
-
(2010)
Proc IEEE 26th Int'l Conf. Data Eng. (ICDE '10)
-
-
Shang, N.1
Nabeel, M.2
Paci, F.3
Bertino, E.4
-
2
-
-
84885691129
-
-
"Liberty Alliance," http://www.projectliberty.org/, 2013.
-
(2013)
Liberty Alliance
-
-
-
3
-
-
84885690593
-
-
"OpenID," http://openid.net/, 2013.
-
(2013)
-
-
-
4
-
-
84885684296
-
-
"Microsoft Windows CardSpace," http://msdn.microsoft.com/en-us/ library/aa480189.aspx, 2013.
-
(2013)
Microsoft Windows CardSpace
-
-
-
7
-
-
33748118047
-
Group key management protocols: A novel taxonomy
-
Y. Challal and H. Seba, "Group key Management Protocols: A Novel Taxonomy," Int'l J. Information Technology, vol. 2, no. 2, pp. 105-118, 2006.
-
(2006)
Int'l J. Information Technology
, vol.2
, Issue.2
, pp. 105-118
-
-
Challal, Y.1
Seba, H.2
-
9
-
-
4544310181
-
A secure multicast protocol with copyright protection
-
H. Chu, L. Qiao, K. Nahrstedt, H. Wang, and R. Jain, "A Secure Multicast Protocol with Copyright Protection," SIGCOMM Computer Comm. Rev., vol. 32, no. 2, pp. 42-60, 2002.
-
(2002)
SIGCOMM Computer Comm. Rev
, vol.32
, Issue.2
, pp. 42-60
-
-
Chu, H.1
Qiao, L.2
Nahrstedt, K.3
Wang, H.4
Jain, R.5
-
11
-
-
0038043478
-
Key establishment in large dynamic groups using one-way function trees
-
May
-
A. Sherman and D. McGrew, "Key Establishment in Large Dynamic Groups Using One-Way Function Trees," IEEE Trans. Software Eng., vol. 29, no. 5, pp. 444-458, May 2003.
-
(2003)
IEEE Trans. Software Eng
, vol.29
, Issue.5
, pp. 444-458
-
-
Sherman, A.1
McGrew, D.2
-
12
-
-
0024715386
-
Secure broadcasting using the secure lock
-
Aug
-
G. Chiou and W. Chen, "Secure Broadcasting Using the Secure Lock," IEEE Trans. Software Eng., vol. 15, no. 8, pp. 929-934, Aug. 1989.
-
(1989)
IEEE Trans. Software Eng
, vol.15
, Issue.8
, pp. 929-934
-
-
Chiou, G.1
Chen, W.2
-
14
-
-
51349114288
-
A Practical and flexible key management mechanism for trusted collaborative computing
-
Apr
-
X. Zou, Y. Dai, and E. Bertino, "A Practical and Flexible Key Management Mechanism for Trusted Collaborative Computing," Proc. IEEE INFOCOM, pp. 538-546, Apr. 2008.
-
(2008)
Proc IEEE INFOCOM
, pp. 538-546
-
-
Zou, X.1
Dai, Y.2
Bertino, E.3
-
15
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Comm ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
17
-
-
77952783550
-
A privacy-preserving approach to policy-based content dissemination
-
N. Shang, M. Nabeel, F. Paci, and E. Bertino, "A Privacy-Preserving Approach to Policy-Based Content Dissemination," Proc. IEEE 26th Int'l Conf. Data Eng. (ICDE '10), 2010.
-
(2010)
Proc IEEE 26th Int'l Conf. Data Eng. (ICDE '10)
-
-
Shang, N.1
Nabeel, M.2
Paci, F.3
Bertino, E.4
-
20
-
-
0021941417
-
The knowledge complexity of interactive proof-systems
-
S. Goldwasser, S. Micali, and C. Rackoff, "The Knowledge Complexity of Interactive Proof-Systems," Proc. 17th Ann. ACM Symp. Theory of Computing (STOC '85), pp. 291-304, 1985.
-
(1985)
Proc. 17th Ann ACM Symp. Theory of Computing (STOC '85)
, pp. 291-304
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
21
-
-
77952765935
-
Gaussian-Jordan elimination
-
Wiley
-
D. Dummit and R. Foote, "Gaussian-Jordan Elimination," Abstract Algebra, second ed., p. 404, Wiley, 1999.
-
(1999)
Abstract Algebra, Second Ed
, pp. 404
-
-
Dummit, D.1
Foote, R.2
-
22
-
-
84880852861
-
Revocation and tracing schemes for stateless receivers
-
Advances in Cryptology - CRYPTO 2001
-
D. Naor, M. Naor, and J.B. Lotspiech, "Revocation and Tracing Schemes for Stateless Receivers," Proc. 21st Ann. Int'l Cryptology Conf. Advances in Cryptology (CRYPTO '01), pp. 41-62, 2001. (Pubitemid 33317907)
-
(2001)
Lecture Notes in Computer Science
, Issue.2139
, pp. 41-62
-
-
Naor, D.1
Naor, M.2
Lotspiech, J.3
-
24
-
-
33751513006
-
OACerts: Oblivious attribute certificates
-
DOI 10.1109/TDSC.2006.54
-
J. Li and N. Li, "OACerts: Oblivious Attribute Certificates," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 4, pp. 340-352, Oct.-Dec. 2006. (Pubitemid 44837036)
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 340-352
-
-
Li, J.1
Li, N.2
-
27
-
-
84884751624
-
-
OpenSSL the Open Source Toolkit for SSL/TLS
-
"OpenSSL the Open Source Toolkit for SSL/TLS," http://www. openssl.org/, 2013.
-
(2013)
-
-
-
28
-
-
85001786260
-
Secure and selective dissemination of XML documents
-
E. Bertino and E. Ferrari, "Secure and Selective Dissemination of XML Documents," ACM Trans. Information System Security, vol. 5, no. 3, pp. 290-331, 2002.
-
(2002)
ACM Trans. Information System Security
, vol.5
, Issue.3
, pp. 290-331
-
-
Bertino, E.1
Ferrari, E.2
-
30
-
-
70449395944
-
Structural signatures for tree data structures
-
A. Kundu and E. Bertino, "Structural Signatures for Tree Data Structures," Proc. VLDB Endowment, vol. 1, no. 1, pp. 138-150, 2008.
-
(2008)
Proc. VLDB Endowment
, vol.1
, Issue.1
, pp. 138-150
-
-
Kundu, A.1
Bertino, E.2
-
31
-
-
67049100253
-
Controlling access to an oblivious database using stateful anonymous credentials
-
S. Coull, M. Green, and S. Hohenberger, "Controlling Access to an Oblivious Database Using Stateful Anonymous Credentials," Proc. 12th Int'l Conf. Practice and Theory in Public Key Cryptography, pp. 501-520, 2009.
-
(2009)
Proc. 12th Int'l Conf. Practice and Theory in Public Key Cryptography
, pp. 501-520
-
-
Coull, S.1
Green, M.2
Hohenberger, S.3
-
32
-
-
74049137084
-
Oblivious transfer with access control
-
J. Camenisch, M. Dubovitskaya, and G. Neven, "Oblivious Transfer with Access Control," Proc. 16th ACM Conf. Computer and Comm. Security (CCS '09), pp. 131-140, 2009.
-
(2009)
Proc. 16 ACM Conf. Computer and Comm. Security (CCS '09)
, pp. 131-140
-
-
Camenisch, J.1
Dubovitskaya, M.2
Neven, G.3
-
33
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
DOI 10.1109/SP.2007.11, 4223236, Proceedings - S and P 2007: 2007 IEEE Symposium on Security and Privacy, SP'07
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-Policy Attribute-Based Encryption," Proc. IEEE Symp. Security and Privacy (SP '07), pp. 321-334, 2007. (Pubitemid 47432538)
-
(2007)
Proceedings - IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
34
-
-
77954471010
-
Attribute based data sharing with attribute revocation
-
S. Yu, C. Wang, K. Ren, and W. Lou, "Attribute Based Data Sharing with Attribute Revocation," Proc. Fifth ACM Symp. Information, Computer and Comm. Security (ASIACCS '10), pp. 261-270, 2010.
-
(2010)
Proc. Fifth ACM Symp. Information, Computer and Comm. Security (ASIACCS '10)
, pp. 261-270
-
-
Yu, S.1
Wang, C.2
Ren, K.3
Lou, W.4
|