Author of the publication

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An Information-Theoretic Approach to the Access Control Problem., and . ICTCS, volume 2841 of Lecture Notes in Computer Science, page 342-354. Springer, (2003)Dynamic Multi-threshold Metering Schemes., , , and . Selected Areas in Cryptography, volume 2012 of Lecture Notes in Computer Science, page 130-143. Springer, (2000)A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy., , and . WCC, volume 3969 of Lecture Notes in Computer Science, page 202-217. Springer, (2005)Hierarchical and Shared Key Assignment., , and . NBiS, page 263-270. IEEE Computer Society, (2014)Metering Schemes for General Access Structures., and . ESORICS, volume 1895 of Lecture Notes in Computer Science, page 72-87. Springer, (2000)Energy Awareness and Secure Communication Protocols: The Era of Green Cybersecurity., , , , and . SSCC, volume 1208 of Communications in Computer and Information Science, page 159-173. Springer, (2019)Efficient provably-secure hierarchical key assignment schemes., , and . Theor. Comput. Sci., 412 (41): 5684-5699 (2011)On-Board Format-Independent Security of Functional Magnetic Resonance Images., , , , , , and . ACM Trans. Embed. Comput. Syst., 16 (2): 56:1-56:15 (2017)Unconditionally secure key assignment schemes., , and . Discret. Appl. Math., 154 (2): 234-252 (2006)Supporting dynamic updates in storage clouds with the Akl-Taylor scheme., , , , , and . Inf. Sci., (2017)