Search - Information and Communication Technology Access content directly

Filter your results

4 results
Keywords : encryption
Image document

New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation

Xingxing Xie , Hua Ma , Jin Li , Xiaofeng Chen
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.373-382, ⟨10.1007/978-3-642-36818-9_41⟩
Conference papers hal-01480196v1
Image document

Verifying Data Authenticity and Integrity in Server-Aided Confidential Forensic Investigation

Shuhui Hou , Ryoichi Sasaki , Tetsutaro Uehara , Siuming Yiu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.312-317, ⟨10.1007/978-3-642-36818-9_33⟩
Conference papers hal-01480187v1
Image document

A Review of Security Attacks on the GSM Standard

Giuseppe Cattaneo , Giancarlo De Maio , Pompeo Faruolo , Umberto Ferraro Petrillo
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.507-512, ⟨10.1007/978-3-642-36818-9_58⟩
Conference papers hal-01480210v1
Image document

Anonymous Lattice-Based Broadcast Encryption

Adela Georgescu
1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.353-362, ⟨10.1007/978-3-642-36818-9_39⟩
Conference papers hal-01480192v1