Filter your results
- 4
- 4
- 4
- 4
- 4
- 4
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.373-382, ⟨10.1007/978-3-642-36818-9_41⟩
Conference papers
hal-01480196v1
|
||
|
Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.312-317, ⟨10.1007/978-3-642-36818-9_33⟩
Conference papers
hal-01480187v1
|
||
|
A Review of Security Attacks on the GSM Standard1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.507-512, ⟨10.1007/978-3-642-36818-9_58⟩
Conference papers
hal-01480210v1
|
||
|
Anonymous Lattice-Based Broadcast Encryption1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.353-362, ⟨10.1007/978-3-642-36818-9_39⟩
Conference papers
hal-01480192v1
|