Attribute-Based Encryption with Enforceable Obligations
Are Chrome Extensions Compliant with the Spirit of Least Privilege?
A collaborative access control framework for online social networks
After you, please: browser extensions order attacks and countermeasures
HMAC and “secure preferences”: Revisiting chromium-based browsers security
Feasibility analysis of Inter-Pulse Intervals based solutions for cryptographic token generation by two electrocardiogram sensors
Migrating monitors + ABE: A suitable combination for secure IoT?
Secure photo sharing in social networks