Back to Results
First PageMeta Content



Secure Attribute-Based Systems ∗ Matthew Pirretti , Patrick Traynor, and Patrick McDaniel
Add to Reading List

Document Date: 2016-01-26 10:59:57


Open Document

File Size: 968,24 KB

Share Result on Facebook

City

Alexandria / /

Company

ACME Corporation / SIIS Laboratory / Motorola / Facebook / Cisco / SRI International / T4 / Tk! / Secure Attribute-Based Systems / T3 / Pharmaceutical / /

Country

United States / /

Currency

pence / ZAR / USD / MNT / /

/

Facility

PairingBased Crypto library / C library / /

IndustryTerm

online application / secure systems / insurance information / attribute systems / pharmaceutical representatives / content-addressable file systems / insurance plan / Attribute-based systems / Online Communities Social networks / threshold operator / applications / accessible web space / file systems / insurance providers / Peer-topeer systems / chemical building blocks / insurance coverage / compliant distributed storage systems / health insurance / encryption algorithms / on resource poor devices / online dating service / online and offline revocation approaches / social networks / social network / trusted central server / low bandwidth networks / real attribute systems / encryption algorithm / sample network / /

MusicGroup

G / /

OperatingSystem

Mac OS X / Linux / Mac OS X Server / Solaris / /

Organization

Pennsylvania State University University / National Science Foundation / Medicare / US Federal Reserve / /

Person

Matthew Pirretti / Whitman Blue Cross Medicare / Miller Hair Color Thin Medium / Brent Waters / Van Buren / Patrick Traynor / Rand Oracles / Patrick McDaniel / Benedict Arnold / Grant Gender Wealth Beverly Crusher / Robert Oppenheimer / Rand Init / /

Position

pharmacist / human resources manager / Billing Secretary / Protection General / ACME Poor Medium Coolidge Nurse / Billing Specialist / administrator / Nurse / Representative / /

Product

Franklin / /

ProgrammingLanguage

C / /

ProvinceOrState

Virginia / Saskatchewan / /

Technology

threshold Attribute-Based Encryption / Decrypt algorithm / encryption algorithms / Linux / encryption algorithm / API / PKI / Setup algorithm / private key / secret key / 2.1 ABE Algorithms / ale / peer-to-peer system / RAID / Human Genome / outer encryption / attribute-based encryption / public key encryption / encryption / ABE encryption / cryptography / KeyGen algorithm / public key / flow control / Encryption system / Encrypt algorithm / Encrypt algorithms / four algorithms / X Server / /

URL

http /

SocialTag