Login / Signup
Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information.
Urs Hengartner
Peter Steenkiste
Published in:
SecureComm (2005)
Keyphrases
</>
access control
pervasive computing
daily life
security model
security policies
metadata
web services
end users
distributed systems
smart environments
identity based encryption