ICISC   2008 International Conference on Information Security and Cryptology
Wall of Fame | Most Viewed ICISC-2008 Paper
165views Cryptology» more  ICISC 2008»
12 years 7 months ago
Distributed Attribute-Based Encryption
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) allows to encrypt data under an access policy, specified as a logical combination of attributes. Such ciphertexts can be decry...
Sascha Müller 0003, Stefan Katzenbeisser, Cla...
Disclaimer and Copyright Notice
Sciweavers respects the rights of all copyright holders and in this regard, authors are only allowed to share a link to their preprint paper on their own website. Every contribution is associated with a desciptive image. It is the sole responsibility of the authors to ensure that their posted image is not copyright infringing. This service is compliant with IEEE copyright.
1Download preprint from source165
2Download preprint from source146
3Download preprint from source129
4Download preprint from source126
5Download preprint from source123
6Download preprint from source113
7Download preprint from source103
8Download preprint from source103
9Download preprint from source89
10Download preprint from source88