EEMCS

Home > Publications
Home University of Twente
Education
Research
Prospective Students
Jobs
Publications
Intranet (internal)
 
 Nederlands
 Contact
 Search
 Organisation

EEMCS EPrints Service


Research Project: SPCMHD: Secure Patient-Centric Management of Health Data
Home Policy Brochure Browse Search User Area Contact Help

2014

Bösch, C.T. and Peter, A. and Hartel, P.H. and Jonker, W. (2014) SOFIR: Securely Outsourced Forensic Image Recognition. In: 39th IEEE International Conference on Acoustics, Speech and Signal Processing, ICASSP 2014, May 4-9, 2014, Florence, Italy. pp. 2694-2698. IEEE. ISBN 978-1-4799-2893-4
Bösch, C.T. and Peter, A. and Leenders, B. and Lim, Hoon Wei and Tang, Qiang and Wang, Huaxiong and Hartel, P.H. and Jonker, W. (2014) Distributed Searchable Symmetric Encryption. In: Twelfth Annual International Conference on Privacy, Security and Trust, PST 2014, 23-24 July 2014, Toronto, Canada. pp. 330-337. IEEE. ISBN 978-1-4799-3502-4

2012

Bösch, C.T. and Brinkman, R. and Hartel, P.H. and Jonker, W. (2012) Method and System of Monitoring a Data Stream. Patent P31230NL00/HSE (Application).
Bösch, C.T. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2012) Selective Document Retrieval from Encrypted Database. In: 15th International Conference on Information Security (ISC), 19-21 Sep 2012, Passau, Germany. pp. 224-241. Lecture Notes in Computer Science 7483. Springer Verlag. ISBN 978-3-642-33383-5
Petit, J.Y. and Bösch, C.T. and Feiri, M.P. and Kargl, F. (2012) On the Potential of PUF for Pseudonym Generation in Vehicular Networks. In: Proceedings of the IEEE Vehicular Networking Conference (VNC 2012), 14-16 Nov 2012, Seoul, Korea. pp. 94-100. IEEE. ISSN 2157-9865 ISBN 978-1-4673-4995-6

2011

Asim, M. and Ibraimi, L. and Petkovic, M. (2011) Ciphertext-Policy Attribute-Based Broadcast Encryption Scheme. In: Proceedings of the 12th IFIP TC 6 / TC 11 International Conference on Communications and Multimedia Security (CMS 2011), 19-21 Oct 2011, Ghent, Belgium. pp. 244-246. Lecture Notes in Computer Science 7025. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-24711-8
Bösch, C.T. and Brinkman, R. and Hartel, P.H. and Jonker, W. (2011) Conjunctive Wildcard Search over Encrypted Data. In: 8th VLDB Workshop on Secure Data Management, SDM 2011, 02 Sep 2011, Seattle, WA, USA. pp. 114-127. Lecture Notes in Computer Science 6933. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-23555-9
Ibraimi, L. (2011) Cryptographically Enforced Distributed Data Access Control. PhD thesis, University of Twente. CTIT Ph.D.-thesis series No. 11-208 ISBN 978-90-365-3228-0
Ibraimi, L. and Asim, M. and Petkovic, M. (2011) Attribute-Based Digital Signature System. Patent WO2011145011 (Application).
Ibraimi, L. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2011) Public-Key Encryption with Delegated Search. In: Proceedings of the 9th International Conference on Applied Cryptography and Network Security (ACNS), 7-10 Jun 2011, Nerja, Spain. pp. 532-549. Lecture Notes in Computer Science 6715. Springer Verlag. ISBN 978-3-642-21553-7

2010

Asim, M. and Ibraimi, L. and Petkovic, M. (2010) Ciphertext-Policy Attribute-Based Encryption and Re-Encryption. Patent WO2010IB54581 (Application).
Ibraimi, L. and Asim, M. and Petkovic, M. (2010) An encryption scheme for a secure policy updating. In: SECRYPT 2010, International Conference on Security and Cryptography, 26-28 Jul 2010, Greece. pp. 399-408. SciTePress. ISBN 978-989-8425-18-8
Ibraimi, L. and Nikova, S.I. and Jonker, W. and Hartel, P.H. (2010) An Identity-Based Group Signature with Membership Revocation in the Standard Model. Technical Report TR-CTIT-10-26, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2010) Exploring Type-and-Identity-Based Proxy Re-Encryption Scheme to Securely Manage Personal Health Records. International Journal of Computational Models and Algorithms in Medicine (IJCMAM), 1 (2). pp. 1-21. ISSN 1947-3133
Roschke, S. and Ibraimi, L. and Cheng, Feng and Meinel, C. (2010) Secure Communication using Identity Based Encryption. In: Proceedings of the 11th Joint IFIP TC6 and TC 11 Conference on Communications and Multimedia Security (CMS), 31 May - 2 June 2010, Linz, Austria. pp. 256-267. Lecture Notes in Computer Science 6109. Springer Verlag. ISBN 3-642-13240-5
Saffarian, M. and Sadighi, B. (2010) Owner-Based Role-Based Access Control OB-RBAC. In: International Conference on Availability, Reliability, and Security (ARES), 15-18 Feb 2010, Krakow, Poland. pp. 236-241. IEEE Computer Society. ISBN 978-1-4244-5879-0

2009

Ibraimi, L. and Asim, M. and Petkovic, M. (2009) Secure Management of Personal Health Records by Applying Attribute-Based Encryption. Technical Report TR-CTIT-09-41, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Ibraimi, L. and Petkovic, M. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2009) Mediated Ciphertext-Policy Attribute-Based Encryption and its Application (extended version). Technical Report TR-CTIT-09-12, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Ibraimi, L. and Petkovic, M. and Nikova, S.I. and Hartel, P.H. and Jonker, W. (2009) Mediated Ciphertext-Policy Attribute-Based Encryption and Its Application. In: Information Security Applications, 25-27 August 2009, Busan, Korea. pp. 309-323. Lecture Notes in Computer Science 5932/2009. Springer Verlag. ISSN 0302-9743 ISBN 978-3-642-10837-2
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2009) Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. In: 5th Information Security Practice and Experience Conference (ISPEC), 12-15 April 2009, Xi'an, China. pp. 1-12. Lecture Notes in Computer Science 5451. Springer. ISSN 0302-9743 ISBN 978-3-642-00842-9
Jonker, W. and Petkovic, M. (2009) Preface. Journal of Computer Security, 17 (1). pp. 1-3. ISSN 0926-227X
Pieters, W. and Tang, Qiang (2009) Data is key: introducing the data-based access control paradigm. Technical Report TR-CTIT-09-22, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Pieters, W. and Tang, Qiang (2009) Data is key: introducing the data-based access control paradigm. In: Data and Applications Security 2009, 12-15 Jul 2009, Montreal, Canada. pp. 240-251. Lecture Notes in Computer Science 5645. Springer Verlag. ISBN 978-3-642-03006-2
Saffarian, M. and Tang, Qiang and Jonker, W. and Hartel, P.H. (2009) Dynamic User Role Assignment in Remote Access Control. Technical Report TR-CTIT-09-14, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang (2009) Timed-Ephemerizer: Make Assured Data Appear and Disappear. In: Sixth European Workshop on Public Key Services, Applications and Infrastructures, 10-11 September, 2009, Pisa, Italy. pp. 195-208. Lecture Notes in Computer Science 6391. Springer Verlag. ISBN 978-3-642-16440-8
Tang, Qiang and Chen, Liqun (2009) Public-key Encryption with Registered Keyword Search. In: Sixth European Workshop on Public Key Services, Applications and Infrastructures, 10-11 September, 2009, Pisa, Italy. pp. 163-178. Lecture Notes in Computer Science 6391. Springer Verlag. ISBN 3-642-16440-4
Tang, Qiang and Hartel, P.H. and Jonker, W. (2009) Inter-domain Identity-Based Proxy Re-encryption. In: Information Security and Cryptology, 4th International Conference (Inscrypt), December 14-17, 2008, Beijing China. pp. 332-347. Lecture Notes in Computer Science 5487. Springer Verlag. ISBN 978-3-642-01439-0
Weng, J. and Yang, Yanjiang and Tang, Qiang and Deng, R. and Bao, F. (2009) Efficient Conditional Proxy Re-encryption with Chosen-Ciphertext Security. In: Information Security - 12th International Conference, ISC, Pisa, Italy, September 7-9, 2009, Pisa, Italy. pp. 151-166. Lecture Notes in Computer Science 5735. Springer Verlag. ISBN 978-3-642-04473-1

2008

Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. Technical Report TR-CTIT-08-31, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) A Type-and-Identity-based Proxy Re-Encryption Scheme and its Application in Healthcare. In: Proceedings of the 5th VLDB Workshop, SDM 2008, August 24, 2008, Auckland, New Zealand. pp. 185-198. Lecture Notes in Computer Science 5159. Springer Verlag. ISBN 978-3-540-85258-2
Ibraimi, L. and Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) Efficient and Provable Secure Ciphertext-Policy Attribute-Based Encryption Schemes. Technical Report TR-CTIT-08-75, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Law, Yee Wei and Moniava, G. and Gong, Zheng and Hartel, P.H. and Palaniswami, M. (2008) KALwEN: A New Practical and Interoperable Key Management Scheme for Body Sensor Networks. Technical Report TR-CTIT-08-67, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang (2008) Type-based Proxy Re-encryption and its Construction. Technical Report TR-CTIT-08-47, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang (2008) Revisit the Concept of PEKS: Problems and a Possible Solution. Technical Report TR-CTIT-08-54, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang (2008) On Using Encryption Techniques to Enhance Sticky Policies Enforcement. Technical Report TR-CTIT-08-64, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625
Tang, Qiang (2008) Type-Based Proxy Re-encryption and Its Construction. In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, December 14-17, 2008, Kharagpur, India. pp. 130-144. Lecture Notes in Computer Science 5365. Springer Verlag. ISBN 978-3-540-89753-8
Tang, Qiang and Bringer, J. and Chabanne, H. and Pointcheval, D. (2008) A Formal Study of the Privacy Concerns in Biometric-Based Remote Authentication Schemes. In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, April 21-23, 2008, Sydney, Australia. pp. 56-70. Lecture Notes in Computer Science 4991. Springer Verlag. ISBN 978-3-540-79103-4
Tang, Qiang and Hartel, P.H. and Jonker, W. (2008) Inter-domain Identity-based Proxy Re-encryption. Technical Report TR-CTIT-08-32, Centre for Telematics and Information Technology University of Twente, Enschede. ISSN 1381-3625