Provable bounds for portable and flexible privacy-preserving access
暂无分享,去创建一个
[1] Mikhail J. Atallah,et al. Enhanced smart-card based license management , 2003, EEE International Conference on E-Commerce, 2003. CEC 2003..
[2] Edward A. Fox,et al. Order-preserving minimal perfect hash functions and information retrieval , 1991, TOIS.
[3] Giovanni Di Crescenzo,et al. Communication-efficient anonymous group identification , 1998, CCS '98.
[4] George Havas,et al. An Optimal Algorithm for Generating Minimal Perfect Hash Functions , 1992, Inf. Process. Lett..
[5] Joe Kilian,et al. Identity Escrow , 1998, CRYPTO.
[6] Marc Joye,et al. A Practical and Provably Secure Coalition-Resistant Group Signature Scheme , 2000, CRYPTO.
[7] Elisa Bertino,et al. Securing XML Documents with Author-X , 2001, IEEE Internet Comput..
[8] Jongseong Kim. Anonymous Authentication Protocol for Dynamic Groups with Power-Limited Devices , 2002 .
[9] Elisa Bertino,et al. Secure and selective dissemination of XML documents , 2002, TSEC.
[10] Elisa Bertino,et al. Selective and authentic third-party distribution of XML documents , 2004, IEEE Transactions on Knowledge and Data Engineering.
[11] Matthew K. Franklin,et al. Anonymous authentication with subset queries (extended abstract) , 1999, CCS '99.
[12] Elisa Bertino,et al. On specifying security policies for web documents with an XML-based language , 2001, SACMAT '01.
[13] Edward A. Fox,et al. Practical minimal perfect hash functions for large databases , 1992, CACM.
[14] Sabrina De Capitani di Vimercati,et al. A fine-grained access control system for XML documents , 2002, TSEC.
[15] Michael Mitzenmacher,et al. Compressed bloom filters , 2001, PODC '01.
[16] Xiaotie Deng,et al. Design and Security Analysis of Anonymous Group Identification Protocols , 2002, Public Key Cryptography.
[17] Dieter Gollmann,et al. Software License Management with Smart Cards , 1999, Smartcard.
[18] Paul F. Syverson,et al. Unlinkable serial transactions: protocols and applications , 1999, TSEC.
[19] Mikhail J. Atallah,et al. Succinct specifications of portable document access policies , 2004, SACMAT '04.
[20] Jan Camenisch,et al. A Group Signature Scheme with Improved Efficiency , 1998, ASIACRYPT.
[21] Stuart E. Schechter,et al. Anonymous Authentication of Membership in Dynamic Groups , 1999, Financial Cryptography.
[22] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[23] Andrei Broder,et al. Network Applications of Bloom Filters: A Survey , 2004, Internet Math..
[24] Paul F. Syverson,et al. Unlinkable Serial Transactions , 1997, Financial Cryptography.
[25] Ivan Visconti,et al. A secure and private system for subscription-based remote services , 2003, TSEC.
[26] Edward A. Fox,et al. A faster algorithm for constructing minimal perfect hash functions , 1992, SIGIR '92.
[27] Sandra Payette,et al. Policy-Carrying, Policy-Enforcing Digital Objects , 2000, ECDL.
[28] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[29] Michael Gertz,et al. Flexible authentication of XML documents , 2001, CCS '01.
[30] Mikhail J. Atallah,et al. Portable and Flexible Document Access Control Mechanisms , 2004, ESORICS.
[31] Li Fan,et al. Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.