메뉴 건너뛰기




Volumn 3, Issue 2, 1991, Pages 113-136

Key processing with control vectors

Author keywords

Access control; Cryptography; Encryption; Hash function; Key distribution; Key management

Indexed keywords

MATHEMATICAL TECHNIQUES--ALGORITHMS;

EID: 0025825432     PISSN: 09332790     EISSN: 14321378     Source Type: Journal    
DOI: 10.1007/BF00196792     Document Type: Article
Times cited : (9)

References (25)
  • 1
    • 84856666538 scopus 로고
    • American National Standard X3.92-1981, American National Standards Institute, New York
    • (1981) Data Encryption Algorithm
  • 5
    • 84934248335 scopus 로고    scopus 로고
    • B. W. Lampson, Protection, Proceedings of the Fifth Princeton Symposium on Information Sciences and Systems, Princeton University, March 1971, pp. 437–443.
  • 10
    • 84934248333 scopus 로고
    • Computer Associates, Computer Associates International, Incorporated, Garden City, New York
    • (1988) CA-ACF2
  • 11
    • 84934248309 scopus 로고    scopus 로고
    • IBM Corporation, Resource Access Control Facility (RACF) General Information Manual (GC28-0722), IBM Corporation, 1988.
  • 22
    • 84934248328 scopus 로고    scopus 로고
    • D. Coppersmith, S. Pilpel, C. H. Meyer, S. M. Matyas, M. M. Hyden, J. Oseas, B. Brachtl, and M. Schilling, Data Authentication Using Modification Detection Codes Based on a Public One Way Encryption Function, U.S. Patent No. 4,908,861 (March 13, 1990).
  • 23
    • 84934248321 scopus 로고    scopus 로고
    • C. H. Meyer and M. Schilling, Secure program load with modification detection code, Proceedings of the Fifth Worldwide Congress on Computer and Communications Security and Protection (SECURICOM 88—SEDEP), 8, Rue de la Michodiere, 75002 Paris, pp. 111–130.
  • 25
    • 84934248320 scopus 로고    scopus 로고
    • B. Brachtl, S. M. Matyas, and C. H. Meyer, Controlled Use of Cryptographic Keys Via Generating Station Established Control Values, U.S. Patent No. 4,850,017 (July 18, 1989).


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.