Author of the publication

A content-driven access control system.

, , , and . IDtrust, volume 283 of ACM International Conference Proceeding Series, page 26-35. ACM, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Privacy preserving EHR system using attribute-based infrastructure., , and . CCSW, page 47-52. ACM, (2010)Short Pairing-Efficient Threshold-Attribute-Based Signature., , and . Pairing, volume 7708 of Lecture Notes in Computer Science, page 295-313. Springer, (2012)Threshold Attribute-Based Signcryption., , and . SCN, volume 6280 of Lecture Notes in Computer Science, page 154-171. Springer, (2010)A content-driven access control system., , , and . IDtrust, volume 283 of ACM International Conference Proceeding Series, page 26-35. ACM, (2008)Mobile Mixer: Exchanging Ideas for Mobile App Development Courses.. SIGCSE (2), page 1251. ACM, (2023)Identity-Based Encryption: a Survey. RSA Laboratories Cryptobytes, 6 (1): 10 -- 19 (March 2003)A Model of the F-18 Mission Computer Software for Pre-Run-Time Scheduling., and . ICDCS, page 62-69. IEEE Computer Society, (1990)