Mediated ciphertext-policy attribute-based encryption and its application L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker Information Security Applications: 10th International Workshop, WISA 2009 …, 2009 | 324 | 2009 |
Secure management of personal health records by applying attribute-based encryption L Ibraimi, M Asim, M Petković Proceedings of the 6th international workshop on wearable, micro, and nano …, 2009 | 198 | 2009 |
Efficient and provable secure ciphertext-policy attribute-based encryption schemes L Ibraimi, Q Tang, P Hartel, W Jonker Information Security Practice and Experience: 5th International Conference …, 2009 | 177 | 2009 |
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker IEEE Trans. Image process, 2009 | 112 | 2009 |
Public-key encryption with delegated search L Ibraimi, S Nikova, P Hartel, W Jonker Applied Cryptography and Network Security: 9th International Conference …, 2011 | 70 | 2011 |
A type-and-identity-based proxy re-encryption scheme and its application in healthcare L Ibraimi, Q Tang, P Hartel, W Jonker Secure Data Management: 5th VLDB Workshop, SDM 2008, Auckland, New Zealand …, 2008 | 60 | 2008 |
An encryption scheme for a secure policy updating L Ibraimi, M Asim, M Petković e-Business and Telecommunications: 7th International Joint Conference, ICETE …, 2012 | 29 | 2012 |
Privacy and security in e-Health applications M Petkovic, L Ibraimi E-health, assistive technologies and applications for assisted living …, 2011 | 14 | 2011 |
Cryptographically enforced distributed data access control L Ibraimi University of Twente, 2011 | 13 | 2011 |
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Univeristy of Twente L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker Tech. Rep, 2009 | 13 | 2009 |
Attribute-based digital signature system L Ibraimi, M Asim, M Petkovic US Patent 9,806,890, 2017 | 10 | 2017 |
Ciphertext-policy attribute-based broadcast encryption scheme M Asim, L Ibraimi, M Petković Communications and Multimedia Security: 12th IFIP TC 6/TC 11 International …, 2011 | 9 | 2011 |
An identity-based group signature with membership revocation in the standard model L Ibraimi, S Nikova, P Hartel, W Jonker available at: http:/doc. utwente. nl/72270/1/Paper. pdf, 2010 | 9 | 2010 |
Secure Communication Using Identity Based Encryption. S Roschke, L Ibraimi, F Cheng, C Meinel Communications and Multimedia Security, 256-267, 2010 | 8 | 2010 |
Exploring type-and-identity-based proxy re-encryption scheme to securely manage personal health records L Ibraimi, Q Tang, P Hartel, W Jonker Clinical Technologies: Concepts, Methodologies, Tools and Applications, 391-411, 2011 | 6 | 2011 |
Information security applications L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker Information Security Applications, 309-323, 2009 | 6 | 2009 |
Mediated ciphertext-policy attribute-based encryption and its application (extended version) L Ibraimi, M Petkovic, SI Nikova, PH Hartel, W Jonker Centre for Telematics and Information Technology (CTIT), 2009 | 1 | 2009 |
Ciphertext-Policy Attribute-Based Encryption and Re-Encryption M Asim, L Ibraimi, M Petkovic WO Patent App. 2010IB54,581, 2010 | | 2010 |