|
Volumn 10, Issue 2, 1995, Pages 92-99
|
Dynamic access control scheme based on the Chinese remainder theorem
|
Author keywords
[No Author keywords available]
|
Indexed keywords
COMPUTER NETWORKS;
CONTROL SYSTEMS;
DISTRIBUTED COMPUTER SYSTEMS;
RESOURCE ALLOCATION;
SECURITY OF DATA;
CHINESE REMAINDER THEOREM;
CRYPTOGRAPHIC KEY ASSIGNMENT;
DYNAMIC ACCESS CONTROL SCHEME;
USER HIERARCHY;
CRYPTOGRAPHY;
|
EID: 0029292250
PISSN: 02676192
EISSN: None
Source Type: Journal
DOI: None Document Type: Article |
Times cited : (16)
|
References (16)
|