Publisher
Springer International Publishing
Reference27 articles.
1. Abdalla, M., Kiltz, E., & Neven, G. (2007). Generalized key delegation for hierarchical identity-based encryption. In European Symposium on Research in Computer Security (pp. 139–154). Berlin: Springer.
2. Abdalla, M., Kiltz, E., Neven, G. (2008). Generalised key delegation for hierarchical identity-based encryption. IET Information Security, 2(3), 67–78.
3. Abdalla, M., De Caro, A., & Phan, D. H. (2012). Generalized key delegation for wildcarded identity-based and inner-product encryption. IEEE Transactions on Information Forensics and Security, 7(6), 1695–1706.
4. Abdalla, M., Catalano, D., Dent, A. W., Malone-Lee, J., Neven, G., Smart, & N. P. (2006). Identity-based encryption gone wild. In International Colloquium on Automata, Languages, and Programming (pp. 300–311). Berlin: Springer.
5. Abdalla, M., Birkett, J., Catalano, D., Dent, A. W., Malone-Lee, J., Neven, G., et al. (2011). Wildcarded identity-based encryption. Journal of Cryptology, 24(1), 42–82.