Robust Encryption In: Theory of Cryptography, pp.480-497, 2010. ,
Persona: An Online Social Network with User-Defined Privacy, p.SIGCOMM, 2009. ,
Key-Privacy in Public-Key Encryption, pp.566-582, 2001. ,
DOI : 10.1007/3-540-45682-1_33
Access control in decentralized online social networks: Applying a policy-hiding cryptographic scheme and evaluating its performance, 2014 IEEE International Conference on Pervasive Computing and Communication Workshops (PERCOM WORKSHOPS), pp.622-628, 2014. ,
DOI : 10.1109/PerComW.2014.6815278
Tor: The Second-Generation Onion Router, USENIX Security Symposium, pp.303-320, 2004. ,
DOI : 10.21236/ADA465464
Broadcast Encryption, CRYPTO'93, pp.480-491, 1994. ,
DOI : 10.1007/3-540-48329-2_40
Towards privacypreserving access control with hidden policies, hidden credentials and hidden decisions, Privacy, Security and Trust (PST), pp.17-24, 2012. ,
DECENT: A decentralized architecture for enforcing privacy in online social networks, 2012 IEEE International Conference on Pervasive Computing and Communications Workshops, pp.326-332, 2012. ,
DOI : 10.1109/PerComW.2012.6197504
Anonymous Broadcast Encryption: Adaptive Security and Efficient Constructions in the Standard Model, PKC 2012, pp.206-224, 2012. ,
DOI : 10.1007/978-3-642-30057-8_13
Cachet, Proceedings of the 8th international conference on Emerging networking experiments and technologies, CoNEXT '12, pp.337-348, 2012. ,
DOI : 10.1145/2413176.2413215