` Key Management The Connection Between Policy and Encryption Terence Spies CTO Voltage Security.
Accumulo Summit 2015: Verifiable Responses to Accumulo Queries [Security]
Anonymous Credentials: How to show credentials without compromising privacy Melissa Chase Microsoft Research.
Ninghui Li (Purdue University) Logic and Logic Programming in Distributed Access Control (Part One) Ninghui Li Department of Computer Science and CERIAS.
Watermarking 3D Objects for Verification