Mediated ciphertext-policy attribute-based encryption and its application L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker Information Security Applications: 10th International Workshop, WISA 2009 …, 2009 | 338 | 2009 |
Secure management of personal health records by applying attribute-based encryption L Ibraimi, M Asim, M Petković Proceedings of the 6th International Workshop on Wearable, Micro, and Nano …, 2009 | 208 | 2009 |
Efficient and provable secure ciphertext-policy attribute-based encryption schemes L Ibraimi, Q Tang, P Hartel, W Jonker Information Security Practice and Experience: 5th International Conference …, 2009 | 184 | 2009 |
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker IEEE Trans. Image process, 2009 | 115 | 2009 |
Public-key encryption with delegated search L Ibraimi, S Nikova, P Hartel, W Jonker International Conference on Applied Cryptography and Network Security, 532-549, 2011 | 72 | 2011 |
A type-and-identity-based proxy re-encryption scheme and its application in healthcare L Ibraimi, Q Tang, P Hartel, W Jonker Secure Data Management: 5th VLDB Workshop, SDM 2008, Auckland, New Zealand …, 2008 | 63 | 2008 |
An encryption scheme for a secure policy updating L Ibraimi, M Asim, M Petković e-Business and Telecommunications: 7th International Joint Conference, ICETE …, 2012 | 29 | 2012 |
Privacy and security in e-Health applications M Petkovic, L Ibraimi User-Driven Healthcare: Concepts, Methodologies, Tools, and Applications …, 2013 | 15 | 2013 |
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Univeristy of Twente L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker Tech. Rep, 2009 | 13 | 2009 |
Cryptographically enforced distributed data access control L Ibraimi | 12 | 2011 |
Attribute-based digital signature system L Ibraimi, M Asim, M Petkovic US Patent 9,806,890, 2017 | 10 | 2017 |
Ciphertext-policy attribute-based broadcast encryption scheme M Asim, L Ibraimi, M Petković Communications and Multimedia Security: 12th IFIP TC 6/TC 11 International …, 2011 | 10 | 2011 |
An identity-based group signature with membership revocation in the standard model L Ibraimi, SI Nikova, W Jonker, PH Hartel Centre for Telematics and Information Technology (CTIT), 2010 | 10 | 2010 |
Secure communication using identity based encryption S Roschke, L Ibraimi, F Cheng, C Meinel Communications and Multimedia Security: 11th IFIP TC 6/TC 11 International …, 2010 | 8 | 2010 |
Exploring type-and-identity-based proxy re-encryption scheme to securely manage personal health records L Ibraimi, Q Tang, P Hartel, W Jonker Clinical Technologies: Concepts, Methodologies, Tools and Applications, 391-411, 2011 | 6 | 2011 |
Information security applications L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker Information Security Applications, 309-323, 2009 | 6 | 2009 |
Mediated ciphertext-policy attribute-based encryption and its application (extended version) L Ibraimi, M Petkovic, SI Nikova, PH Hartel, W Jonker Centre for Telematics and Information Technology (CTIT), 2009 | 1 | 2009 |
Ciphertext-Policy Attribute-Based Encryption and Re-Encryption M Asim, L Ibraimi, M Petkovic WO Patent App. 2010IB54,581, 2010 | | 2010 |