Exploiting cryptography for privacy-enhanced access control: A result of the PRIME ProjectClaudio A. ArdagnaJan Camenischet al.2010Journal of Computer Security
Generalised key delegation for hierarchical identity-based encryptionM. AbdallaE. Kiltzet al.2008IET Information Security