Filter your results
- 4
- 4
- 4
- 1
- 4
- 4
- 2
- 1
- 2
- 1
- 2
- 2
- 2
- 1
- 4
- 2
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
Toward Mining of Temporal Roles27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.65-80, ⟨10.1007/978-3-642-39256-6_5⟩
Conference papers
hal-01490718v1
|
||
|
Unconditionally Secure Fully Connected Key Establishment Using Deployment Knowledge1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.496-501, ⟨10.1007/978-3-642-36818-9_56⟩
Conference papers
hal-01480209v1
|
||
|
Analysis of TRBAC with Dynamic Temporal Role Hierarchies27th Data and Applications Security and Privacy (DBSec), Jul 2013, Newark, NJ, United States. pp.297-304, ⟨10.1007/978-3-642-39256-6_22⟩
Conference papers
hal-01490714v1
|
||
|
Decentralized Ciphertext-Policy Attribute-Based Encryption Scheme with Fast Decryption14th International Conference on Communications and Multimedia Security (CMS), Sep 2013, Magdeburg,, Germany. pp.66-81, ⟨10.1007/978-3-642-40779-6_5⟩
Conference papers
hal-01492834v1
|