| Publication | Date of Publication | Type |
|---|
Supporting dynamic updates in storage clouds with the Akl-Taylor scheme Information Sciences | 2020-02-06 | Paper |
scientific article; zbMATH DE number 6741949 (Why is no real title available?) | 2017-07-11 | Paper |
On the relations between security notions in hierarchical key assignment schemes for dynamic structures Information Security and Privacy | 2016-09-02 | Paper |
On secret set schemes Information Processing Letters | 2016-06-16 | Paper |
A note on time-bound hierarchical key assignment schemes Information Processing Letters | 2013-03-21 | Paper |
Provably-secure time-bound hierarchical key assignment schemes Journal of Cryptology | 2012-07-03 | Paper |
Efficient provably-secure hierarchical key assignment schemes Theoretical Computer Science | 2011-10-10 | Paper |
An information-theoretic approach to the access control problem. Lecture Notes in Computer Science | 2010-02-23 | Paper |
Variations on a theme by Akl and Taylor: security and tradeoffs Theoretical Computer Science | 2009-12-01 | Paper |
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants Mathematical Foundations of Computer Science 2009 | 2009-10-16 | Paper |
Cryptographic key assignment schemes for any access control policy Information Processing Letters | 2009-08-27 | Paper |
Ideal contrast visual cryptography schemes with reversing Information Processing Letters | 2009-08-27 | Paper |
New constructions for provably-secure time-bound hierarchical key assignment schemes Theoretical Computer Science | 2008-11-18 | Paper |
Efficient Provably-Secure Hierarchical Key Assignment Schemes Mathematical Foundations of Computer Science 2007 | 2008-09-17 | Paper |
An attack on a payment scheme Information Sciences | 2008-03-12 | Paper |
Coding and Cryptography Lecture Notes in Computer Science | 2007-05-02 | Paper |
Cryptology and Network Security Lecture Notes in Computer Science | 2006-11-14 | Paper |
Sharing multiple secrets: Models, schemes and analysis Designs, Codes and Cryptography | 2006-05-29 | Paper |
Enforcing the security of a time-bound hierarchical key assignment scheme Information Sciences | 2006-05-16 | Paper |
Unconditionally secure key assignment schemes Discrete Applied Mathematics | 2006-04-28 | Paper |
A linear algebraic approach to metering schemes Designs, Codes and Cryptography | 2005-01-17 | Paper |
Anonymous membership broadcast schemes Designs, Codes and Cryptography | 2004-08-16 | Paper |
Bounds and constructions for metering schemes. Communications in Information and Systems | 2004-01-26 | Paper |
A note on optimal metering schemes. Information Processing Letters | 2003-01-21 | Paper |
Constructions and bounds for unconditionally secure non-interactive commitment schemes Designs, Codes and Cryptography | 2002-08-21 | Paper |
Efficient metering schemes with pricing IEEE Transactions on Information Theory | 2002-08-04 | Paper |
scientific article; zbMATH DE number 1696675 (Why is no real title available?) | 2002-01-28 | Paper |
scientific article; zbMATH DE number 1689003 (Why is no real title available?) | 2002-01-09 | Paper |
A lower bound on the encoding length in lossy transmission Information Sciences | 2000-01-05 | Paper |
Multiple ramp schemes IEEE Transactions on Information Theory | 1999-11-21 | Paper |