Author of the publication

A Type-and-Identity-Based Proxy Re-encryption Scheme and Its Application in Healthcare.

, , , and . Secure Data Management, volume 5159 of Lecture Notes in Computer Science, page 185-198. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

StreamTo: Streaming Content using a Tamper-Resistant Token., , , , , and . SEC, volume 181 of IFIP, page 601-612. Springer, (2005)Scheduling Optimisations for SPIN to Minimise Buffer Requirements in Synchronous Data Flow., , and . FMCAD, page 1-10. IEEE, (2008)Workload-based configuration of MEMS-based storage devices for mobile systems., , and . EMSOFT, page 41-50. ACM, (2008)Power management of MEMS-based storage devices for mobile systems., and . CASES, page 245-254. ACM, (2008)A Programming and a Modelling Perspective on the Evaluation of Java Card Implementations., and . Java Card Workshop, volume 2041 of Lecture Notes in Computer Science, page 52-72. Springer, (2000)Basic Proof Skills of Computer Science Students., , and . FPLE, volume 1022 of Lecture Notes in Computer Science, page 269-287. Springer, (1995)The Operational Semantics of a Java Secure Processor., , and . Formal Syntax and Semantics of Java, volume 1523 of Lecture Notes in Computer Science, page 313-352. Springer, (1999)An Operational Model of QuickPay - Extended Abstract., , and . CARDIS, volume 1820 of Lecture Notes in Computer Science, page 19-28. Springer, (1998)Rethinking Blockchain Security: Position Paper., , , , , , , and . iThings/GreenCom/CPSCom/SmartData, page 1273-1280. IEEE, (2018)Performance of Lazy Combinator Graph Reduction.. Softw. Pract. Exp., 21 (3): 299-329 (1991)