-
1
-
-
85008525712
-
Seamless, Synchronous, and Supportive: Welcome to Hybridcast: An Advanced Hybrid Broadcast and Broadband System
-
Apr
-
A. Baba, K. Matsumura, S. Mitsuya, M. Takechi, H. Fujisawa, H. Hamada, S. Sunasaki, and H. Katoh, "Seamless, Synchronous, and Supportive: Welcome to Hybridcast: An Advanced Hybrid Broadcast and Broadband System," Consumer Electronics Magazine, IEEE, vol. 1, no. 2, pp. 43-52, Apr. 2012.
-
(2012)
Consumer Electronics Magazine IEEE
, vol.1
, Issue.2
, pp. 43-52
-
-
Baba, A.1
Matsumura, K.2
Mitsuya, S.3
Takechi, M.4
Fujisawa, H.5
Hamada, H.6
Sunasaki, S.7
Katoh, H.8
-
3
-
-
77952627694
-
OHTV(Open Hybrid TV) service platform based on terrestrial DTV
-
Phoenix Park, Korea Feb
-
D. Lee, M. Lee, and D. Kang, "OHTV(Open Hybrid TV) service platform based on terrestrial DTV," in Proc. IEEE International Conference on Advanced Communication Technology, Phoenix Park, Korea, pp. 399-402, Feb. 2010.
-
(2010)
Proc. IEEE International Conference on Advanced Communication Technology
, pp. 399-402
-
-
Lee, D.1
Lee, M.2
Kang, D.3
-
4
-
-
85030174634
-
GroupLens: An Open Architecture for Collaborative Filtering of Netnews
-
Chapel Hill, USA Oct
-
P. Resnick, N. Iacovou, M. Suchak, P. Bergstrom, and J. Riedl, "GroupLens: An Open Architecture for Collaborative Filtering of Netnews," in Proc. ACM 1994 Conference on Computer Supported Cooperative Work, Chapel Hill, USA, pp. 175-186, Oct. 1994.
-
(1994)
Proc. ACM 1994 Conference on Computer Supported Cooperative Work
, pp. 175-186
-
-
Resnick, P.1
Iacovou, N.2
Suchak, M.3
Bergstrom, P.4
Riedl, J.5
-
5
-
-
84936077777
-
Privacy Preserving System for Integrated Broadcast-broadband Services
-
Las Vegas, USA Jan
-
G. Ohtake, and K. Ogawa, "Privacy Preserving System for Integrated Broadcast-broadband Services," in Proc. IEEE International Conference on Consumer Electronics, Las Vegas, USA, pp. 306-307, Jan. 2015.
-
(2015)
Proc. IEEE International Conference on Consumer Electronics
, pp. 306-307
-
-
Ohtake, G.1
Ogawa, K.2
-
6
-
-
24944554962
-
Fuzzy identity-based encryption
-
Denmark May
-
A. Sahai, and B. Waters, "Fuzzy identity-based encryption," in Proc. Eurocrypt, Aarhus, Denmark, pp. 457-473, May. 2005.
-
(2005)
Proc. Eurocrypt, Aarhus
, pp. 457-473
-
-
Sahai, A.1
Waters, B.2
-
7
-
-
34547273527
-
Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data
-
Alexandria, USA Oct
-
V. Goyal, O. Pandey, A. Sahai and B. Waters, "Attribute-Based Encryption for Fine-Grained Access Control of Encrypted Data," in Proc. ACM Conference on Computer and Communications Security, Alexandria, USA, pp. 89-98, Oct. 2006.
-
(2006)
Proc. ACM Conference on Computer and Communications Security
, pp. 89-98
-
-
Goyal, V.1
Pandey, O.2
Sahai, A.3
Waters, B.4
-
8
-
-
74049120601
-
Attribute-based encryption with non-monotonic access structures
-
Alexandria, USA Oct
-
R. Ostrovsky, A. Sahai, and B. Waters, "Attribute-based encryption with non-monotonic access structures," in Proc. ACM Conference on Computer and Communications Security, Alexandria, USA, pp. 195-203, Oct. 2007.
-
(2007)
Proc. ACM Conference on Computer and Communications Security
, pp. 195-203
-
-
Ostrovsky, R.1
Sahai, A.2
Waters, B.3
-
9
-
-
34548731375
-
Ciphertext-policy attribute-based encryption
-
Oakland, USA May
-
J. Bethencourt, A. Sahai, and B. Waters, "Ciphertext-policy attribute-based encryption," in Proc. IEEE Symposium on Security and Privacy, Oakland, USA, pp. 321-334, May. 2007.
-
(2007)
Proc. IEEE Symposium on Security and Privacy
, pp. 321-334
-
-
Bethencourt, J.1
Sahai, A.2
Waters, B.3
-
10
-
-
45749116552
-
Provably secure ciphertext policy ABE
-
Alexandria, USA Oct
-
L. Cheung, and C. Newport, "Provably secure ciphertext policy ABE," in Proc. ACM Conference on Computer and Communications Security, Alexandria, USA, pp. 456-465, Oct. 2007.
-
(2007)
Proc. ACM Conference on Computer and Communications Security
, pp. 456-465
-
-
Cheung, L.1
Newport, C.2
-
11
-
-
44449129423
-
Predicate encryption supporting disjunctions, polynomial equations, and inner products
-
Istanbul, Turkey Apr
-
J. Katz, A. Sahai, and B. Waters, "Predicate encryption supporting disjunctions, polynomial equations, and inner products," in Proc. Eurocrypt, Istanbul, Turkey, pp. 146-162, Apr. 2008.
-
(2008)
Proc. Eurocrypt
, pp. 146-162
-
-
Katz, J.1
Sahai, A.2
Waters, B.3
-
12
-
-
45749094622
-
Attributebased encryption with partially hidden encryptor-specified access structures
-
New York, USA Jun
-
T. Nishide, K. Yoneyama, and K. Ohta, "Attributebased encryption with partially hidden encryptor-specified access structures," in Proc. International Conference on Applied Cryptography and Network Security, New York, USA, pp. 111-129, Jun. 2008.
-
(2008)
Proc. International Conference on Applied Cryptography and Network Security
, pp. 111-129
-
-
Nishide, T.1
Yoneyama, K.2
Ohta, K.3
-
13
-
-
70350635850
-
A ciphertext-policy attribute-based encryption scheme with constant ciphertext length
-
Xian, China Apr
-
K. Emura, A. Miyaji, A. Nomura, K. Omote, and M. Soshi, "A ciphertext-policy attribute-based encryption scheme with constant ciphertext length," in Proc. International Conference on Information Security Practice and Experience, Xian, China, pp. 13-23. Apr. 2009.
-
(2009)
Proc. International Conference on Information Security Practice and Experience
, pp. 13-23
-
-
Emura, K.1
Miyaji, A.2
Nomura, A.3
Omote, K.4
Soshi, M.5
-
14
-
-
77954635558
-
Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption
-
Monaco, France May
-
A. Lewko, T. Okamoto, A. Sahai, K. Takashima, and B. Waters, "Fully secure functional encryption: Attribute-based encryption and (hierarchical) inner product encryption," in Proc. Eurocrypt, Monaco, France, pp. 62-91, May. 2010.
-
(2010)
Proc. Eurocrypt
, pp. 62-91
-
-
Lewko, A.1
Okamoto, T.2
Sahai, A.3
Takashima, K.4
Waters, B.5
-
15
-
-
77957011503
-
Fully secure functional encryption with general relations from the decisional linear assumption
-
Santa Barbara, USA Aug
-
T. Okamoto, and K. Takashima, "Fully secure functional encryption with general relations from the decisional linear assumption," in Proc. Crypto, Santa Barbara, USA, pp. 191-208, Aug. 2010.
-
(2010)
Proc. Crypto
, pp. 191-208
-
-
Okamoto, T.1
Takashima, K.2
-
16
-
-
79952521560
-
Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization
-
Taormina, Italy Mar
-
B. Waters, "Ciphertext-policy attribute-based encryption: An expressive, efficient, and provably secure realization," in Proc. International Conference on Practice and Theory in Public Key Cryptography, Taormina, Italy, pp. 53-70. Mar. 2011.
-
(2011)
Proc. International Conference on Practice and Theory in Public Key Cryptography
, pp. 53-70
-
-
Waters, B.1
-
17
-
-
84887689538
-
Partially wildcarded attribute-based encryption and its efficient construction
-
Reykjavik, Iceland Jul
-
G. Ohtake, Y. Hironaka, K. Kai, Y. Endo, G. Hanaoka, H. Watanabe, S. Yamada, K. Kasamatsu, T. Yamakawa, and H. Imai, "Partially Wildcarded Attribute-based Encryption and Its Efficient Construction," in Proc. International Conference on Security and Cryptography, Reykjavik, Iceland, pp. 339-346, Jul. 2013.
-
(2013)
Proc. International Conference on Security and Cryptography
, pp. 339-346
-
-
Ohtake, G.1
Hironaka, Y.2
Kai, K.3
Endo, Y.4
Hanaoka, G.5
Watanabe, H.6
Yamada, S.7
Kasamatsu, K.8
Yamakawa, T.9
Imai, H.10
-
18
-
-
84945148327
-
-
JIPDEC JIPDEC, Japan, Apr in Japanese
-
JIPDEC, "The PrivacyMark System," JIPDEC, Japan, Apr. 2014. (in Japanese)
-
(2014)
The PrivacyMark System
-
-
-
19
-
-
84945148328
-
CryptoJS: JavaScript Implementations of Standard and Secure Cryptographic Algorithms (online)
-
Jan
-
J. Mott, "CryptoJS: JavaScript Implementations of Standard and Secure Cryptographic Algorithms (online)," Jeff Mott, Jan. 2013.
-
(2013)
Jeff Mott
-
-
Mott, J.1
-
20
-
-
78649396605
-
Data Leakage Detection
-
Jan
-
P. Papadimitriou, and H. Garcia-Molina, "Data Leakage Detection," IEEE Trans. Knowledge and Data Engineering, vol. 23, no. 1, pp. 51-63, Jan. 2011.
-
(2011)
IEEE Trans. Knowledge and Data Engineering
, vol.23
, Issue.1
, pp. 51-63
-
-
Papadimitriou, P.1
Garcia-Molina, H.2
-
21
-
-
18844365338
-
Watermarking Relational Databases
-
Hong Kong, China Aug
-
R. Agrawal, and J. Kiernan, "Watermarking Relational Databases," in Proc. 28th International Conference on Very Large Data Bases, Hong Kong, China, pp. 155-166, Aug. 2002.
-
(2002)
Proc. 28th International Conference on Very Large Data Bases
, pp. 155-166
-
-
Agrawal, R.1
Kiernan, J.2
-
22
-
-
19944413957
-
Fingerprinting Relational Databases: Schemes and Specialties
-
Jan -Mar
-
Y. Li, V. Swarup, and S. Jajodia, "Fingerprinting Relational Databases: Schemes and Specialties," IEEE Trans. Dependable and Secure Computing, vol. 2, no. 1, pp. 34-45, Jan.-Mar. 2005.
-
(2005)
IEEE Trans. Dependable and Secure Computing
, vol.2
, Issue.1
, pp. 34-45
-
-
Li, Y.1
Swarup, V.2
Jajodia, S.3
|