Filter your results
- 4
- 4
- 4
- 4
- 2
- 2
- 4
- 4
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
- 1
|
|
sorted by
|
|
New Ciphertext-Policy Attribute-Based Access Control with Efficient Revocation1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.373-382, ⟨10.1007/978-3-642-36818-9_41⟩
Conference papers
hal-01480196v1
|
||
|
An Effective Cloud-Based Active Defense System against Malicious Codes2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.690-695, ⟨10.1007/978-3-642-55032-4_71⟩
Conference papers
hal-01397288v1
|
||
|
M-SRS: Secure and Trustworthy Mobile Service Review System Based on Mobile Cloudlet2nd Information and Communication Technology - EurAsia Conference (ICT-EurAsia), Apr 2014, Bali, Indonesia. pp.612-621, ⟨10.1007/978-3-642-55032-4_63⟩
Conference papers
hal-01397277v1
|
||
|
Secure and Verifiable Outsourcing of Sequence Comparisons1st International Conference on Information and Communication Technology (ICT-EurAsia), Mar 2013, Yogyakarta, Indonesia. pp.243-252, ⟨10.1007/978-3-642-36818-9_25⟩
Conference papers
hal-01480179v1
|