Publications

(2024). Hierarchical Key Assignment Schemes with Key Rotation. In Proceedings of the 29th ACM Symposium on Access Control Models and Technologies (SACMAT ‘24)..

Cite DOI

(2024). Identity-Based Matchmaking Encryption from Standard Lattice Assumptions. In Proceedings of the 22nd International Conference on Applied Cryptography and Network Security (ACNS ‘24)..

Cite DOI

(2023). Security Analysis of Access Control Policies for Smart Homes. In Proceedings of the 28th ACM Symposium on Access Control Models and Technologies (SACMAT ’23).

PDF Cite DOI

(2015). An example journal article. Journal of Source Themes, 1(1).

PDF Cite Code Slides