Zobrazeno 1 - 10
of 129
pro vyhledávání: '"De Decker, B."'
Publikováno v:
In Mathematical and Computer Modelling April 2013 57(7-8):1592-1605
Autor:
Eisemann, M.1, De Decker, B.2, Magnor, M.1, Bekert, P.2, De Aguiar, E.3, Ahmed, N.3, Theobalt, C.4, Sellent, A.1
Publikováno v:
Computer Graphics Forum. Apr2008, Vol. 27 Issue 2, p409-418. 10p. 3 Color Photographs, 1 Black and White Photograph, 4 Diagrams.
Publikováno v:
In Clinica Chimica Acta June 2019 493 Supplement 1:S450-S450
Publikováno v:
Communications and Multimedia Security (12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21,2011. Proceedings), 244-246
STARTPAGE=244;ENDPAGE=246;TITLE=Communications and Multimedia Security (12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21,2011. Proceedings)
Communications and Multimedia Security ISBN: 9783642247118
Communications and Multimedia Security
Proceedings of the 12th IFIP TC 6 / TC 11 International Conference on Communications and Multimedia Security (CMS 2011), 244-246
STARTPAGE=244;ENDPAGE=246;TITLE=Proceedings of the 12th IFIP TC 6 / TC 11 International Conference on Communications and Multimedia Security (CMS 2011)
STARTPAGE=244;ENDPAGE=246;TITLE=Communications and Multimedia Security (12th IFIP TC 6 / TC 11 International Conference, CMS 2011, Ghent, Belgium, October 19-21,2011. Proceedings)
Communications and Multimedia Security ISBN: 9783642247118
Communications and Multimedia Security
Proceedings of the 12th IFIP TC 6 / TC 11 International Conference on Communications and Multimedia Security (CMS 2011), 244-246
STARTPAGE=244;ENDPAGE=246;TITLE=Proceedings of the 12th IFIP TC 6 / TC 11 International Conference on Communications and Multimedia Security (CMS 2011)
In this work, we design a new attribute-based encryption scheme with the revocation capability. In the proposed schemes, the user (broadcaster) encrypts the data according to an access policy over the set of attributes, and a list of the identities o
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::744d3f17c8b2483a9962456d334922ff
https://doi.org/10.1007/978-3-642-24712-5_25
https://doi.org/10.1007/978-3-642-24712-5_25
Kniha
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Publikováno v:
2009 International Conference on Computational Science & Engineering; 2009, p430-437, 8p
Publikováno v:
2009 International Conference on Availability, Reliability & Security; 2009, p847-852, 6p
Publikováno v:
2009 IEEE Conference on Computer Vision & Pattern Recognition; 2009, p2536-2543, 8p
Publikováno v:
Proceedings 1993 IEEE Computer Society Symposium on Research in Security & Privacy; 1993, p66-79, 14p
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.