Author of the publication

Extensions to ciphertext-policy attribute-based encryption to support distributed environments.

, , , and . IJCAT, 47 (2/3): 215-226 (2013)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

On modeling and evaluating multicomputer transcoding architectures for live-video streams., , , , , and . Multimedia Tools Appl., 43 (2): 109-129 (2009)Cell-graph coloring for cancerous tissue modelling and classification., , and . Multimedia Tools Appl., 66 (2): 229-245 (2013)Special issue on "Theory and practice of high-performance computing, communications, and security"., , , and . The Journal of Supercomputing, 55 (2): 123-125 (2011)A Survey on Decentralized Flocking Schemes for a Set of Autonomous Mobile Robots (Invited Paper)., , , , , and . JCM, 5 (1): 31-38 (2010)Extensions to ciphertext-policy attribute-based encryption to support distributed environments., , , and . IJCAT, 47 (2/3): 215-226 (2013)Trends in high-performance computing and communications for ubiquitous computing., , and . Knowledge Eng. Review, 29 (4): 407-408 (2014)Adaptive routing protocol for mobile ad hoc networks., , , and . Computing, 96 (9): 817-827 (2014)SH-CRBAC: Integrating Attribute and Status Constraints into the RBAC Model in Smart Home Systems., , , and . Comput. J., 52 (8): 861-870 (2009)Flexible Key Distribution for SCADA Network using Multi-Agent System., , and . BLISS, page 29-34. IEEE Computer Society, (2007)ISARE: An Integrated Software Architecture Reuse and Evaluation Framework., , , and . FGIT-ASEA, volume 117 of Communications in Computer and Information Science, page 174-187. Springer, (2010)