ACME Corporation / SIIS Laboratory / Motorola / Facebook / Cisco / SRI International / T4 / Tk! / Secure Attribute-Based Systems / T3 / Pharmaceutical / /
Country
United States / /
Currency
pence / ZAR / USD / MNT / / /
Facility
PairingBased Crypto library / C library / /
IndustryTerm
online application / secure systems / insurance information / attribute systems / pharmaceutical representatives / content-addressable file systems / insurance plan / Attribute-based systems / Online Communities Social networks / threshold operator / applications / accessible web space / file systems / insurance providers / Peer-topeer systems / chemical building blocks / insurance coverage / compliant distributed storage systems / health insurance / encryption algorithms / on resource poor devices / online dating service / online and offline revocation approaches / social networks / social network / trusted central server / low bandwidth networks / real attribute systems / encryption algorithm / sample network / /
MusicGroup
G / /
OperatingSystem
Mac OS X / Linux / Mac OS X Server / Solaris / /
Organization
Pennsylvania State University University / National Science Foundation / Medicare / US Federal Reserve / /
Person
Matthew Pirretti / Whitman Blue Cross Medicare / Miller Hair Color Thin Medium / Brent Waters / Van Buren / Patrick Traynor / Rand Oracles / Patrick McDaniel / Benedict Arnold / Grant Gender Wealth Beverly Crusher / Robert Oppenheimer / Rand Init / /
Position
pharmacist / human resources manager / Billing Secretary / Protection General / ACME Poor Medium Coolidge Nurse / Billing Specialist / administrator / Nurse / Representative / /
Product
Franklin / /
ProgrammingLanguage
C / /
ProvinceOrState
Virginia / Saskatchewan / /
Technology
threshold Attribute-Based Encryption / Decrypt algorithm / encryption algorithms / Linux / encryption algorithm / API / PKI / Setup algorithm / private key / secret key / 2.1 ABE Algorithms / ale / peer-to-peer system / RAID / Human Genome / outer encryption / attribute-based encryption / public key encryption / encryption / ABE encryption / cryptography / KeyGen algorithm / public key / flow control / Encryption system / Encrypt algorithm / Encrypt algorithms / four algorithms / X Server / /