default search action
Leyou Zhang
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [j64]Leyou Zhang, Xinmin Li, Qing Wu, Fatemeh Rezaeibagha:
Blockchain-Aided Anonymous Traceable and Revocable Access Control Scheme With Dynamic Policy Updating for the Cloud IoT. IEEE Internet Things J. 11(1): 526-542 (2024) - [j63]Leyou Zhang, Shuwei Xie, Qing Wu, Fatemeh Rezaeibagha:
Enhanced Secure Attribute-Based Dynamic Data Sharing Scheme With Efficient Access Policy Hiding and Policy Updating for IoMT. IEEE Internet Things J. 11(16): 27435-27447 (2024) - [j62]Shuwei Xie, Leyou Zhang, Qing Wu, Fatemeh Rezaeibagha:
Flexibly expressive and revocable multi-authority KP-ABE scheme from RLWE for Internet of Medical Things. J. Syst. Archit. 152: 103179 (2024) - [j61]Qing Wu, Guoqiang Meng, Leyou Zhang, Yue Lei:
An anonymous and large-universe data-sharing scheme with traceability for medical cloud storage. J. Syst. Archit. 153: 103210 (2024) - [j60]Chuchu Zhao, Leyou Zhang, Qing Wu, Fatemeh Rezaeibagha:
Publicly Accountable Data-Sharing Scheme Supporting Privacy Protection for Fog-Enabled VANETs. IEEE Trans. Veh. Technol. 73(6): 8487-8502 (2024) - [c21]Yi Chuai, Leyou Zhang, Shuwei Xie, Runze Tian, Zhuang Shan:
Hierarchical Identity-Based Encryption Based on SM9. DSPP (1) 2024: 106-118 - [i7]Zhuang Shan, Leyou Zhang, Qing Wu:
Heuristic Ideal Obfuscation Scheme based on LWE Problem, its Variants and Quantum Oracle. IACR Cryptol. ePrint Arch. 2024: 392 (2024) - [i6]Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai:
Analysis, modify and apply in IIOT form light-weight PSI in CM20. IACR Cryptol. ePrint Arch. 2024: 969 (2024) - [i5]Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai:
Inner Product Ring LWE Problem, Reduction, New Trapdoor Algorithm for Inner Product Ring LWE Problem and Ring SIS Problem. IACR Cryptol. ePrint Arch. 2024: 1179 (2024) - [i4]Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai, Fuchun Guo:
Oblivious Pseudo Random Function base on Ideal Lattice, Application in PSI and PIR. IACR Cryptol. ePrint Arch. 2024: 1349 (2024) - 2023
- [j59]Leyou Zhang, Guang Yang, Chao Song, Qing Wu:
Accountable multi-authority attribute-based data access control in smart grids. J. King Saud Univ. Comput. Inf. Sci. 35(7): 101597 (2023) - [j58]Xuanyang Hou, Leyou Zhang, Qing Wu, Fatemeh Rezaeibagha:
Collusion-resistant dynamic privacy-preserving attribute-access control scheme based on blockchain. J. King Saud Univ. Comput. Inf. Sci. 35(8): 101658 (2023) - [j57]Qing Wu, Guoqiang Meng, Leyou Zhang, Fatemeh Rezaeibagha:
Collusion resistant multi-authority access control scheme with privacy protection for personal health records. J. King Saud Univ. Comput. Inf. Sci. 35(8): 101677 (2023) - [j56]Ruonan Ma, Leyou Zhang:
SPMAC: Secure and privacy-preserving multi-authority access control for fog-enabled IoT cloud storage. J. Syst. Archit. 142: 102951 (2023) - [j55]Tianshuai Zhang, Leyou Zhang, Qing Wu, Yi Mu, Fatemeh Rezaeibagha:
Redactable Blockchain-Enabled Hierarchical Access Control Framework for Data Sharing in Electronic Medical Records. IEEE Syst. J. 17(2): 1962-1973 (2023) - [j54]Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Lanxiang Chen, Leyou Zhang:
Toward Secure Data Computation and Outsource for Multi-User Cloud-Based IoT. IEEE Trans. Cloud Comput. 11(1): 217-228 (2023) - [j53]Ruonan Ma, Leyou Zhang, Qing Wu, Yi Mu, Fatemeh Rezaeibagha:
BE-TRDSS: Blockchain-Enabled Secure and Efficient Traceable-Revocable Data-Sharing Scheme in Industrial Internet of Things. IEEE Trans. Ind. Informatics 19(11): 10821-10830 (2023) - [j52]Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Lanxiang Chen, Leyou Zhang:
Authenticable Additive Homomorphic Scheme and its Application for MEC-Based IoT. IEEE Trans. Serv. Comput. 16(3): 1664-1672 (2023) - [i3]Zhuang Shan, Leyou Zhang, Qing Wu, Qiqi Lai:
Algebraic isomorphic spaces of ideal lattices, reduction of Ring-SIS problem, and new reduction of Ring-LWE problem. IACR Cryptol. ePrint Arch. 2023: 1412 (2023) - 2022
- [j51]Jian Su, Leyou Zhang, Yi Mu:
BA-RMKABSE: Blockchain-aided Ranked Multi-keyword Attribute-based Searchable Encryption with Hiding Policy for Smart Health System. Future Gener. Comput. Syst. 132: 299-309 (2022) - [j50]Leyou Zhang, Tianshuai Zhang, Qing Wu, Yi Mu, Fatemeh Rezaeibagha:
Secure Decentralized Attribute-Based Sharing of Personal Health Records With Blockchain. IEEE Internet Things J. 9(14): 12482-12496 (2022) - [j49]Leyou Zhang, Ye Zhang, Qing Wu, Yi Mu, Fatemeh Rezaeibagha:
A Secure and Efficient Decentralized Access Control Scheme Based on Blockchain for Vehicular Social Networks. IEEE Internet Things J. 9(18): 17938-17952 (2022) - [j48]Ye Zhang, Leyou Zhang, Qing Wu, Yi Mu:
Blockchain-enabled efficient distributed attribute-based access control framework with privacy-preserving in IoV. J. King Saud Univ. Comput. Inf. Sci. 34(10 Part B): 9216-9227 (2022) - [j47]Qing Wu, Taotao Lai, Leyou Zhang, Yi Mu, Fatemeh Rezaeibagha:
Blockchain-enabled multi-authorization and multi-cloud attribute-based keyword search over encrypted data in the cloud. J. Syst. Archit. 129: 102569 (2022) - [j46]Leyou Zhang, Chuchu Zhao, Qing Wu, Yi Mu, Fatemeh Rezaeibagha:
A traceable and revocable multi-authority access control scheme with privacy preserving for mHealth. J. Syst. Archit. 130: 102654 (2022) - [j45]Leyou Zhang, Xuehuang Gao, Li Kang, Pengfei Liang, Yi Mu:
Distributed Ciphertext-Policy Attribute-Based Encryption With Enhanced Collusion Resilience and Privacy Preservation. IEEE Syst. J. 16(1): 735-746 (2022) - [j44]Qing Wu, Liangjun Li, Leyou Zhang, Yi Mu, Fatemeh Rezaeibagha:
Secure and Efficient General Circuits Attribute-Based Access Control in Cloud Computing. IEEE Syst. J. 16(4): 5533-5543 (2022) - [j43]Leyou Zhang, Wenting You, Yi Mu:
Secure Outsourced Attribute-Based Sharing Framework for Lightweight Devices in Smart Health Systems. IEEE Trans. Serv. Comput. 15(5): 3019-3030 (2022) - 2021
- [j42]Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Leyou Zhang:
Enhanced bitcoin with two-factor authentication. Int. J. Inf. Comput. Secur. 16(3/4): 292-306 (2021) - [j41]Leyou Zhang, Yadi Ye, Yi Mu:
Multiauthority Access Control With Anonymous Authentication for Personal Health Record. IEEE Internet Things J. 8(1): 156-167 (2021) - [j40]Leyou Zhang, Jun Wang, Yi Mu:
Privacy-Preserving Flexible Access Control for Encrypted Data in Internet of Things. IEEE Internet Things J. 8(19): 14731-14745 (2021) - [j39]Fatemeh Rezaeibagha, Yi Mu, Ke Huang, Leyou Zhang, Xinyi Huang:
Secure and Privacy-Preserved Data Collection for IoT Wireless Sensors. IEEE Internet Things J. 8(24): 17669-17677 (2021) - [j38]Sercan Ö. Arik, Joel Shor, Rajarishi Sinha, Jinsung Yoon, Joseph R. Ledsam, Long T. Le, Michael W. Dusenberry, Nathanael C. Yoder, Kris Popendorf, Arkady Epshteyn, Johan Euphrosine, Elli Kanal, Isaac Jones, Chun-Liang Li, Beth Luan, Joe Mckenna, Vikas Menon, Shashank Singh, Mimi Sun, Ashwin Sura Ravi, Leyou Zhang, Dario Sava, Kane Cunningham, Hiroki Kayama, Thomas C. Tsai, Daisuke Yoneoka, Shuhei Nomura, Hiroaki Miyata, Tomas Pfister:
A prospective evaluation of AI-augmented epidemiology to forecast COVID-19 in the USA and Japan. npj Digit. Medicine 4 (2021) - [j37]Gongcheng Hu, Leyou Zhang, Yi Mu, Xiaoxu Gao:
An Expressive "Test-Decrypt-Verify" Attribute-Based Encryption Scheme With Hidden Policy for Smart Medical Cloud. IEEE Syst. J. 15(1): 365-376 (2021) - [c20]Yadi Ye, Leyou Zhang, Wenting You, Yi Mu:
Secure Decentralized Access Control Policy for Data Sharing in Smart Grid. INFOCOM Workshops 2021: 1-6 - 2020
- [j36]Leyou Zhang, Juan Ren, Yi Mu, Baocang Wang:
Privacy-Preserving Multi-Authority Attribute-Based Data Sharing Framework for Smart Grid. IEEE Access 8: 23294-23307 (2020) - [j35]Leyou Zhang, Xiaoxu Gao, Fuchun Guo, Gongcheng Hu:
Improving the Leakage Rate of Ciphertext-Policy Attribute-Based Encryption for Cloud Computing. IEEE Access 8: 94033-94042 (2020) - [j34]Leyou Zhang, Jian Su, Yi Mu:
Outsourcing Attributed-Based Ranked Searchable Encryption With Revocation for Cloud Storage. IEEE Access 8: 104344-104356 (2020) - [j33]Leyou Zhang, Jun Wang, Yi Mu:
Secure and Privacy-Preserving Attribute-Based Sharing Framework in Vehicles Ad Hoc Networks. IEEE Access 8: 116781-116795 (2020) - [j32]Leyou Zhang, Xuehuang Gao, Yi Mu:
Secure Data Sharing With Lightweight Computation in E-Health. IEEE Access 8: 209630-209643 (2020) - [j31]Xiaoxu Gao, Leyou Zhang:
Efficient Anonymous Ciphertext-Policy Attribute-based Encryption for General Structures Supporting Leakage-Resilience. Int. J. Netw. Secur. 22(5): 763-774 (2020) - [j30]Li Kang, Leyou Zhang:
A Privacy-Preserving Data Sharing System with Decentralized Attribute-based Encryption Scheme. Int. J. Netw. Secur. 22(5): 815-827 (2020) - [j29]Leyou Zhang, Yilei Cui, Yi Mu:
Improving Security and Privacy Attribute Based Data Sharing in Cloud Computing. IEEE Syst. J. 14(1): 387-397 (2020) - [c19]Sercan Ömer Arik, Chun-Liang Li, Jinsung Yoon, Rajarishi Sinha, Arkady Epshteyn, Long T. Le, Vikas Menon, Shashank Singh, Leyou Zhang, Martin Nikoltchev, Yash Sonthalia, Hootan Nakhost, Elli Kanal, Tomas Pfister:
Interpretable Sequence Learning for Covid-19 Forecasting. NeurIPS 2020 - [i2]Sercan Ömer Arik, Chun-Liang Li, Jinsung Yoon, Rajarishi Sinha, Arkady Epshteyn, Long T. Le, Vikas Menon, Shashank Singh, Leyou Zhang, Nate Yoder, Martin Nikoltchev, Yash Sonthalia, Hootan Nakhost, Elli Kanal, Tomas Pfister:
Interpretable Sequence Learning for COVID-19 Forecasting. CoRR abs/2008.00646 (2020) - [i1]Yadi Ye, Leyou Zhang, Yi Mu, Wenting You:
Secure Decentralized Access Control Policy for Data Sharing in Smart Grid. IACR Cryptol. ePrint Arch. 2020: 1567 (2020)
2010 – 2019
- 2019
- [j28]Leyou Zhang, Gongcheng Hu, Yi Mu, Fatemeh Rezaeibagha:
Hidden Ciphertext Policy Attribute-Based Encryption With Fast Decryption for Personal Health Record System. IEEE Access 7: 33202-33213 (2019) - [j27]Leyou Zhang, Yujie Shang:
Leakage-resilient Attribute-based Encryption with CCA2 Security. Int. J. Netw. Secur. 21(5): 819-827 (2019) - [j26]Pengfei Liang, Leyou Zhang, Li Kang, Juan Ren:
Privacy-preserving decentralized ABE for secure sharing of personal health records in cloud storage. J. Inf. Secur. Appl. 47: 258-266 (2019) - [j25]Hongjian Yin, Leyou Zhang, Yilei Cui:
Improving Security in Ciphertext-Policy Attribute-Based Encryption with Hidden Access Policy and Testing. KSII Trans. Internet Inf. Syst. 13(5): 2768-2780 (2019) - [c18]Li Kang, Leyou Zhang:
Improving File Hierarchy Attribute-Based Encryption Scheme with Multi-authority in Cloud. FCS 2019: 3-18 - [c17]Xiaoxu Gao, Leyou Zhang, Gongcheng Hu:
Anonymous Leakage-Resilient Ciphertext-Policy Attribute-Based Encryption Supporting Direct Revocation. FCS 2019: 21-35 - [c16]Juan Ren, Leyou Zhang:
Hierarchical Identity-Based Signature over Verifiable Random Function. FCS 2019: 177-189 - [c15]Gongcheng Hu, Leyou Zhang:
Analysis of Ciphertext Policy Hidden Attribute-Based Encryption and Its Improved Method. FCS 2019: 193-208 - 2018
- [j24]Leyou Zhang, Pengfei Liang, Yi Mu:
Improving Privacy-Preserving and Security for Decentralized Key-Policy Attributed-Based Encryption. IEEE Access 6: 12736-12745 (2018) - [j23]Leyou Zhang, Zhuanning Wang, Yi Mu, Yupu Hu:
Fully secure hierarchical inner product encryption for privacy preserving keyword searching in cloud. Int. J. High Perform. Comput. Netw. 11(1): 45-54 (2018) - [j22]Leyou Zhang, Hongjian Yin:
Recipient Anonymous Ciphertext-Policy Attribute-based Broadcast Encryption. Int. J. Netw. Secur. 20(1): 168-176 (2018) - [c14]Pengfei Liang, Leyou Zhang, Yujie Shang:
Novel Secure Privacy-Preserving Decentralized Attribute-Based Encryption. FCS 2018: 66-80 - [c13]Hongjian Yin, Leyou Zhang, Yi Mu:
A Novel Privacy-Preserving Decentralized Ciphertext-Policy Attribute-Based Encryption with Anonymous Key Generation. ICCCS (3) 2018: 435-446 - [c12]Leyou Zhang, Yilei Cui, Yi Mu:
Improving Privacy-Preserving CP-ABE with Hidden Access Policy. ICCCS (3) 2018: 596-605 - 2017
- [j21]Leyou Zhang, Jingxia Zhang, Yi Mu:
Novel Leakage-Resilient Attribute-Based Encryption from Hash Proof System. Comput. J. 60(4): 541-554 (2017) - [j20]Qing Wu, Leyou Zhang, Jingxia Zhang:
Fuzzy Biometric-Based Encryption for Encrypted Data in the Cloud. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 100-A(5): 1257-1261 (2017) - [j19]Leyou Zhang, Zongchen Sun, Yi Mu, Yupu Hu:
Revocable hierarchical identity-based encryption over lattice for pay-TV systems. Int. J. Embed. Syst. 9(4): 379-398 (2017) - [j18]Jing Wei, Leyou Zhang:
Ciphertext policy attribute-based encryption with hierarchical domain authorities and users in cloud. Int. J. High Perform. Comput. Netw. 10(6): 524-533 (2017) - [j17]Jingxia Zhang, Leyou Zhang:
Anonymous CP-ABE against Side-channel Attacks in Cloud Computing. J. Inf. Sci. Eng. 33(3): 789-805 (2017) - [c11]Leyou Zhang, Qing Wu:
Adaptively Secure Hierarchical Identity-Based Encryption over Lattice. NSS 2017: 46-58 - [c10]Hongjian Yin, Leyou Zhang:
Security Analysis and Improvement of An Anonymous Attribute-Based Proxy Re-encryption. SpaCCS 2017: 344-352 - 2016
- [j16]Leyou Zhang, Yi Mu, Qing Wu:
Compact Anonymous Hierarchical Identity-Based Encryption with Constant Size Private Keys. Comput. J. 59(4): 452-461 (2016) - [j15]Leyou Zhang, Qing Wu, Yi Mu, Jingxia Zhang:
Privacy-Preserving and Secure Sharing of PHR in the Cloud. J. Medical Syst. 40(12): 267:1-267:13 (2016) - 2015
- [c9]Leyou Zhang, Zhuanning Wang, Yi Mu, Yupu Hu:
Fully Secure Hierarchical Inner Product Encryption for Privacy Preserving Keyword Searching in Cloud. 3PGCIC 2015: 449-453 - [c8]Leyou Zhang, Zhuanning Wang, Qing Wu:
Leakage-Resilient Anonymous Identity-Based Broadcast Encryption in the Standard Model. ICA3PP (Workshops and Symposiums) 2015: 201-210 - 2013
- [j14]Yang Yang, Yupu Hu, Chun-hui Sun, Chao Lv, Leyou Zhang:
An efficient group key agreement scheme for mobile ad-hoc networks. Int. Arab J. Inf. Technol. 10(1): 10-17 (2013) - [j13]Jin Sun, Yupu Hu, Leyou Zhang:
A key-policy attribute-based broadcast encryption. Int. Arab J. Inf. Technol. 10(5): 444-452 (2013) - [j12]Leyou Zhang, Yupu Hu:
New Constructions of Hierarchical Attribute-Based Encryption for Fine-Grained Access Control in Cloud Computing. KSII Trans. Internet Inf. Syst. 7(5): 1343-1356 (2013) - [j11]Yang Yang, Yupu Hu, Leyou Zhang:
An Efficient Biometric Identity Based Signature Scheme. KSII Trans. Internet Inf. Syst. 7(8): 2010-2026 (2013) - [j10]Qing Wu, Leyou Zhang:
New Efficient Hierarchical Identity-based Signature. J. Comput. 8(3): 803-810 (2013) - [c7]Leyou Zhang, Qing Wu, Yi Mu:
Anonymous Identity-Based Broadcast Encryption with Adaptive Security. CSS 2013: 258-271 - [c6]Qing Wu, Leyou Zhang:
Hierarchical Identity-Based Signature with Short Public Keys. CSS 2013: 272-281 - 2012
- [j9]Leyou Zhang, Yupu Hu, Qing Wu:
Adaptively secure identity-based broadcast encryption with constant size private keys and ciphertexts from the subgroups. Math. Comput. Model. 55(1-2): 12-18 (2012) - [c5]Leyou Zhang, Qing Wu, Yupu Hu:
Direct CCA Secure Identity-Based Broadcast Encryption. NSS 2012: 348-360 - 2011
- [j8]Leyou Zhang, Qing Wu, Yupu Hu:
New Constructions of Identity-based Broadcast Encryption without Random Oracles. KSII Trans. Internet Inf. Syst. 5(2): 428-439 (2011) - [j7]Leyou Zhang, Qing Wu, Yupu Hu:
Secure Identity-based Threshold Broadcast Encryption in the Standard Model. J. Networks 6(11): 1602-1609 (2011) - [j6]Leyou Zhang, Qing Wu, Yupu Hu:
New Constructions of Short Signatures in the Standard Model. J. Softw. 6(10): 1921-1928 (2011) - [j5]Yang Yang, Yupu Hu, Leyou Zhang, Chun-hui Sun:
CCA2 secure biometric identity based encryption with constant-size ciphertext. J. Zhejiang Univ. Sci. C 12(10): 819-827 (2011) - 2010
- [j4]Leyou Zhang, Yupu Hu, Qing Wu:
Identity-based Threshold Broadcast Encryption in the Standard Model. KSII Trans. Internet Inf. Syst. 4(3): 400-410 (2010) - [j3]Qing Wu, Sanyang Liu, Leyou Zhang:
Particle Swarm Optimization for Semi-supervised Support Vector Machine. J. Inf. Sci. Eng. 26(5): 1695-1706 (2010) - [j2]Qing Wu, Sanyang Liu, Leyou Zhang:
Support Vector Regression Based on Adjustable Entropy Function Approach. J. Inf. Sci. Eng. 26(6): 2331-2339 (2010) - [c4]Leyou Zhang, Yupu Hu, Qing Wu:
Short Signature from the Bilinear Pairing. ICICA (LNCS) 2010: 111-118
2000 – 2009
- 2009
- [j1]Leyou Zhang, Yupu Hu, Qing Wu:
New Construction of Short Hierarchical ID-Based Signature in the Standard Model. Fundam. Informaticae 90(1-2): 191-201 (2009) - 2008
- [c3]Ningbo Mu, Yupu Hu, Leyou Zhang:
On the Computational Efficiency of XTR+. Inscrypt 2008: 305-313 - [c2]Leyou Zhang, Yupu Hu, Ningbo Mu:
An Identity-based Broadcast Encryption Protocol for Ad Hoc Networks. ICYCS 2008: 1619-1623 - 2006
- [c1]Qing Wu, Sanyang Liu, Leyou Zhang:
Hypersphere Support Vector Machines Based on Multiplicative Updates. ICNC (1) 2006: 1-4
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-04 21:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint