Author of the publication

UC-RBAC: A Usage Constrained Role-Based Access Control Model.

, , , and . ICICS, volume 2836 of Lecture Notes in Computer Science, page 337-347. Springer, (2003)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Analysis and Design of E-voting Protocol., , and . SEC, volume 175 of IFIP Conference Proceedings, page 281-290. Kluwer, (2000)Fault-tolerate Multiparty Electronic Contract Signing Protocol., and . AMT, volume 138 of Frontiers in Artificial Intelligence and Applications, page 79-85. IOS Press, (2006)FARB: Fast Anonymous Reputation-Based Blacklisting without TTPs., and . WPES, page 139-148. ACM, (2014)A Worst-Case Entropy Estimation of Oscillator-Based Entropy Sources: When the Adversaries Have Access to the History Outputs., , , , , and . TrustCom/BigDataSE, page 152-159. IEEE, (2019)Computing Walsh coefficients from the algebraic normal form of a Boolean function., , , and . Cryptogr. Commun., 6 (4): 335-358 (2014)On the provable security of TPM2.0 cryptography APIs., and . Int. J. Embed. Syst., 7 (3/4): 230-243 (2015)Multiple Privacy Regimes Mechanism for Local Differential Privacy., , , , and . DASFAA (2), volume 11447 of Lecture Notes in Computer Science, page 247-263. Springer, (2019)New Methods for Bounding the Length of Impossible Differentials of SPN Block Ciphers., , , , , , and . IACR Cryptol. ePrint Arch., (2023)Reconstructing a Packed DLL Binary for Static Analysis., , and . ISPEC, volume 5451 of Lecture Notes in Computer Science, page 71-82. Springer, (2009)Optimal Defense Strategies for DDoS Defender Using Bayesian Game Model., , , , and . ISPEC, volume 7863 of Lecture Notes in Computer Science, page 44-59. Springer, (2013)