Cited By
View all- Cimorelli Belfiore RDe Santis AFerrara AMasucci BNiu JVaidya J(2024)Hierarchical Key Assignment Schemes with Key RotationProceedings of the 29th ACM Symposium on Access Control Models and Technologies10.1145/3649158.3657037(171-182)Online publication date: 24-Jun-2024
- Zhao RZhang YWen WLan RXiang Y(2024)E-TPE: Efficient Thumbnail-Preserving Encryption for Privacy Protection in Visual Sensor NetworksACM Transactions on Sensor Networks10.1145/359261120:4(1-26)Online publication date: 11-May-2024
- Yu DLee SHsu RLee J(2024)Ensuring End-to-End Security With Fine-Grained Access Control for Connected and Autonomous VehiclesIEEE Transactions on Information Forensics and Security10.1109/TIFS.2024.341729219(6962-6977)Online publication date: 1-Jan-2024
- Show More Cited By