Author of the publication

Poster: trans-organizational role-based access control.

, , and . ACM Conference on Computer and Communications Security, page 817-820. ACM, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hash-Based Signature with Constant-Sum Fingerprinting and Partial Construction of Hash Chains., , and . ICETE (2), page 463-470. SciTePress, (2018)Sufficient Conditions on Most Likely Local Sub-codewords in Recursive Maximum Likelihood Decoding Algorithms., , and . AAECC, volume 2227 of Lecture Notes in Computer Science, page 333-342. Springer, (2001)Right-Linear Finite Path Overlapping Term Rewriting Systems Effectively Preserve Recognizability., , and . RTA, volume 1833 of Lecture Notes in Computer Science, page 246-260. Springer, (2000)Bounds on the entropy of multinomial distribution.. ISIT, page 1362-1366. IEEE, (2015)Constant-sum fingerprinting for Winternitz one-time signature., , and . ISITA, page 703-707. IEEE, (2016)On the Computational Complexity of the Linear Solvability of Information Flow Problems with Hierarchy Constraint., , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 99-A (12): 2211-2217 (2016)Hybrid-BFT: Optimistically Responsive Synchronous Consensus with Optimal Latency or Resilience., , and . IACR Cryptology ePrint Archive, (2020)RBAC-SC: Role-Based Access Control Using Smart Contract., , and . IEEE Access, (2018)A Call-by-Need Recursive Algorithm for the LogMAP Decoding of a Binary Linear Block Code., and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 86-A (12): 3306-3309 (2003)Information leakage through passive timing attacks on RSA decryption system., and . ISITA, page 392-396. IEEE, (2020)