Vyzkoušejte nový nástroj s podporou AI
Summon Research Assistant
BETA
Privacy Preserving Policy-Based Content Sharing in Public Clouds
Nabeel, Mohamed, Ning Shang, Bertino, Elisa
Published in IEEE transactions on knowledge and data engineering (01.11.2013)
Published in IEEE transactions on knowledge and data engineering (01.11.2013)
Get full text
Journal Article
An Efficient Certificateless Encryption for Secure Data Sharing in Public Clouds
Seung-Hyun Seo, Nabeel, Mohamed, Xiaoyu Ding, Bertino, Elisa
Published in IEEE transactions on knowledge and data engineering (01.09.2014)
Published in IEEE transactions on knowledge and data engineering (01.09.2014)
Get full text
Journal Article
Robust Multi-Factor Authentication for Fragile Communications
Xinyi Huang, Yang Xiang, Bertino, Elisa, Jianying Zhou, Li Xu
Published in IEEE transactions on dependable and secure computing (01.11.2014)
Published in IEEE transactions on dependable and secure computing (01.11.2014)
Get full text
Journal Article
Dictionary Based Secure Provenance Compression for Wireless Sensor Networks
Changda Wang, Hussain, Syed Rafiul, Bertino, Elisa
Published in IEEE transactions on parallel and distributed systems (01.02.2016)
Published in IEEE transactions on parallel and distributed systems (01.02.2016)
Get full text
Journal Article
Single-Database Private Information Retrieval from Fully Homomorphic Encryption
Xun Yi, Kaosar, M. G., Paulet, R., Bertino, E.
Published in IEEE transactions on knowledge and data engineering (01.05.2013)
Published in IEEE transactions on knowledge and data engineering (01.05.2013)
Get full text
Journal Article
Android User Privacy Preserving Through Crowdsourcing
Rashidi, Bahman, Fung, Carol, Anh Nguyen, Tam Vu, Bertino, Elisa
Published in IEEE transactions on information forensics and security (01.03.2018)
Published in IEEE transactions on information forensics and security (01.03.2018)
Get full text
Journal Article
Privacy-preserving authentication of trees and graphs
Kundu, Ashish, Bertino, Elisa
Published in International journal of information security (01.11.2013)
Published in International journal of information security (01.11.2013)
Get full text
Journal Article