102 results on '"Lisa Ferrara"'
Search Results
2. Identity-Based Matchmaking Encryption from Standard Lattice Assumptions.
3. Provably-Secure One-Message Unilateral Entity Authentication Schemes.
4. Hierarchical Key Assignment Schemes with Key Rotation.
5. Security Analysis of Access Control Policies for Smart Homes.
6. An Integrated Approach to Learning Solutions: UCD + LS&D + AIEd.
7. ETS® AI Labs™ Ways of Working Tutorial: How to Build Evidence-Based, User-Obsessed, AI-Enabled Learning Solutions in an Agile Framework.
8. Verifiable Hierarchical Key Assignment Schemes.
9. Continuous Entity Authentication in the Internet of Things Scenario
10. Fuzzy-based approach to assess and prioritize privacy risks.
11. Preventing Unauthorized Data Flows.
12. Toward Group-Based User-Attribute Policies in Azure-Like Access Control Systems.
13. Policy Privacy in Cryptographic Access Control.
14. Vac - Verifier of Administrative Role-Based Access Control Policies.
15. Verifiable Hierarchical Key Assignment Schemes.
16. Policy Analysis for Self-administrated Role-Based Access Control.
17. Cryptographically Enforced RBAC.
18. Analyzing temporal role based access control models.
19. Security Analysis of Role-Based Access Control through Program Verification.
20. Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants.
21. Practical Short Signature Batch Verification.
22. Security analysis for temporal role based access control.
23. New constructions for provably-secure time-bound hierarchical key assignment schemes.
24. Efficient Provably-Secure Hierarchical Key Assignment Schemes.
25. Provably-secure time-bound hierarchical key assignment schemes.
26. A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy.
27. An Information-Theoretic Approach to the Access Control Problem.
28. A note on time-bound hierarchical key assignment schemes.
29. Provably-Secure Time-Bound Hierarchical Key Assignment Schemes.
30. Efficient provably-secure hierarchical key assignment schemes.
31. Variations on a theme by Akl and Taylor: Security and tradeoffs.
32. An attack on a payment scheme.
33. New constructions for provably-secure time-bound hierarchical key assignment schemes.
34. Enforcing the security of a time-bound hierarchical key assignment scheme.
35. Unconditionally secure key assignment schemes.
36. Ideal contrast visual cryptography schemes with reversing.
37. Cryptographic key assignment schemes for any access control policy.
38. A simple algorithm for the constrained sequence problems.
39. Modeling A Certified Email Protocol using I/O Automata.
40. Data and Applications Security and Privacy XXXVIII : 38th Annual IFIP WG 11.3 Conference, DBSec 2024, San Jose, CA, USA, July 15–17, 2024, Proceedings
41. A Simple Algorithm for the Constrained Sequence Problems
42. Data and Applications Security and Privacy XXXVII : 37th Annual IFIP WG 11.3 Conference, DBSec 2023, Sophia-Antipolis, France, July 19–21, 2023, Proceedings
43. Cell and Tissue Response to Polyethylene Terephthalate Mesh Containing Bone Allograft in Vitro and in Vivo
44. Critical Evaluation of Biomechanical Principles and Radiographic Indicators for Fusion Assessment in a Novel Conformable Porous Mesh Implant
45. Current Concepts of Contemporary Expandable Lumbar Interbody Fusion Cage Designs, Part 2: Feasibility Assessment of an Endplate Conforming Bidirectional Expandable Interbody Cage
46. Load Share Mapping for Traditional PEEK vs Novel Hybrid PEEK With Expandable Porous Mesh Intervertebral Devices
47. Current Concepts of Contemporary Expandable Lumbar Interbody Fusion Cage Designs, Part 1: An Editorial on Their Biomechanical Characteristics
48. Expandable Interbody Fusion Cages: An Editorial on the Surgeon's Perspective on Recent Technological Advances and Their Biomechanical Implications
49. Fuzzy-based approach to assess and prioritize privacy risks
50. Practical Short Signature Batch Verification.
Catalog
Books, media, physical & digital resources
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.