Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information | IEEE Conference Publication | IEEE Xplore