Luan Ibraimi
Luan Ibraimi
Verified email at shell.com
TitleCited byYear
Mediated ciphertext-policy attribute-based encryption and its application
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
International Workshop on Information Security Applications, 309-323, 2009
2382009
Secure management of personal health records by applying attribute-based encryption
L Ibraimi, M Asim, M Petković
Proceedings of the 6th International Workshop on Wearable, Micro, and Nano …, 2009
1362009
Efficient and provable secure ciphertext-policy attribute-based encryption schemes
L Ibraimi, Q Tang, P Hartel, W Jonker
International Conference on Information Security Practice and Experience, 1-12, 2009
1292009
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
762009
Public-key encryption with delegated search
L Ibraimi, S Nikova, P Hartel, W Jonker
International Conference on Applied Cryptography and Network Security, 532-549, 2011
502011
A type-and-identity-based proxy re-encryption scheme and its application in healthcare
L Ibraimi, Q Tang, P Hartel, W Jonker
Workshop on Secure Data Management, 185-198, 2008
462008
An encryption scheme for a secure policy updating
L Ibraimi, M Asim, M Petković
International Conference on E-Business and Telecommunications, 304-318, 2010
222010
Privacy and security in e-Health applications
M Petkovic, L Ibraimi
E-health, assistive technologies and applications for assisted living …, 2011
112011
Cryptographically enforced distributed data access control
L Ibraimi
University of Twente, 2011
72011
An identity-based group signature with membership revocation in the standard model
L Ibraimi, S Nikova, P Hartel, W Jonker
available at: http:/doc. utwente. nl/72270/1/Paper. pdf, 2010
72010
Information security applications
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
Berlin, Germany: Springer, 2009
72009
Ciphertext-policy attribute-based threshold decryption with flexible delegation and revocation of user attributes. Univeristy of Twente
L Ibraimi, M Petkovic, S Nikova, P Hartel, W Jonker
Tech. Rep, 2009
72009
Exploring type-and-identity-based proxy re-encryption scheme to securely manage personal health records
L Ibraimi, Q Tang, P Hartel, W Jonker
Clinical Technologies: Concepts, Methodologies, Tools and Applications, 391-411, 2011
62011
Ciphertext-policy attribute-based broadcast encryption scheme
M Asim, L Ibraimi, M Petković
IFIP International Conference on Communications and Multimedia Security, 244-246, 2011
52011
Secure communication using identity based encryption
S Roschke, L Ibraimi, F Cheng, C Meinel
IFIP International Conference on Communications and Multimedia Security, 256-267, 2010
52010
Mediated ciphertext-policy attribute-based encryption and its application (extended version)
L Ibraimi, M Petkovic, SI Nikova, PH Hartel, W Jonker
Centre for Telematics and Information Technology (CTIT), 2009
12009
Attribute-based digital signature system
L Ibraimi, M Asim, M Petkovic
US Patent 9,806,890, 2017
2017
Attribute-Based Digital Signature System
L Ibraimi, M Asim, M Petkovic
WO Patent 2,011,145,011, 2011
2011
Ciphertext-Policy Attribute-Based Encryption and Re-Encryption
M Asim, L Ibraimi, M Petkovic
WO Patent App. 2010IB54,581, 2010
2010
The system can't perform the operation now. Try again later.
Articles 1–19