Cited By
View all- Kumar NTiwari SZheng ZMishra KSangaiah A(2018)An efficient and provably secure time‐limited key management scheme for outsourced dataConcurrency and Computation: Practice and Experience10.1002/cpe.449830:15Online publication date: 7-May-2018
- Alderman JFarley NCrampton J(2017)Tree-Based Cryptographic Access ControlComputer Security – ESORICS 201710.1007/978-3-319-66402-6_5(47-64)Online publication date: 12-Aug-2017
- Castiglione ADe Santis AMasucci BPalmieri FCastiglione AHuang X(2016)Cryptographic Hierarchical Access Control for Dynamic StructuresIEEE Transactions on Information Forensics and Security10.1109/TIFS.2016.258114711:10(2349-2364)Online publication date: Oct-2016
- Show More Cited By