1. Blaze, M., Bleumer, G., and Strauss, M. (June, January 31). Divertible protocols and atomic proxy cryptography. Proceedings of the Advances in Cryptology—EUROCRYPT’98: International Conference on the Theory and Application of Cryptographic Techniques, Espoo, Finland.
2. Green, M., and Ateniese, G. (2007, January 5–8). Identity-based proxy re-encryption. Proceedings of the Applied Cryptography and Network Security: 5th International Conference, ACNS 2007, Zhuhai, China.
3. Weng, J., Deng, R.H., Ding, X., Chu, C.-K., and Lai, J. (2009, January 10–12). Conditional proxy re-encryption secure against chosen-ciphertext attack. Proceedings of the 4th International Symposium on Information, Computer, and Communications Security, Sydney, Australia.
4. Sahai, A., and Waters, B. (2005, January 24–26). Fuzzy identity-based encryption. Proceedings of the Advances in Cryptology–EUROCRYPT 2005: 24th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Aarhus, Denmark.
5. Group-based discretionary access control in health related repositories;Zamite;J. Inf. Technol. Res. JITR,2014