-
1
-
-
0019573099
-
-
pp. 312328
-
DAVIDA, G.I., WELLS, D.L., and KAM, J.B.: 'A database encryption system with subkeys',ACMTrans. Database Syst., 1981,6, (2), pp. 312328
-
WELLS, D.L., and KAM, J.B.: 'A Database Encryption System with Subkeys',ACMTrans. Database Syst., 1981,6, (2)
-
-
Davida, G.I.1
-
3
-
-
0022583299
-
-
pp. 156-172
-
DENNING, D.E., AKL, S.G., MORGENSTERN, M., and NEUMANN, P.O.: 'Views for multilevel database security', Proc. 1986 IEEE Symp. on Security and Privacy, 7-9, April 1986, Oakland, CA, pp. 156-172
-
AKL, S.G., MORGENSTERN, M., and NEUMANN, P.O.: 'Views for Multilevel Database Security', Proc. 1986 IEEE Symp. on Security and Privacy, 7-9, April 1986, Oakland, CA
-
-
Denning, D.E.1
-
4
-
-
0023231848
-
-
pp. 161-166
-
McCULLOUGH, D.: 'Specifications for multilevel security and a hookup property', Proc. 1987 IEEE Symp. on Security and Privacy, 27-29, April 1987, Oakland, CA, pp. 161-166
-
'Specifications for Multilevel Security and a Hookup Property', Proc. 1987 IEEE Symp. on Security and Privacy, 27-29, April 1987, Oakland, CA
-
-
McCullough, D.1
-
5
-
-
0022582820
-
-
pp. 34-39
-
McHUGH, J., and MOORE, A.P.: 'A security policy and formal top level specification for a multilevel secure local area network', Proc. 1986 IEEE Symp. on Security and Privacy, 7-9, April 1986, Oakland, CA, pp. 34-39
-
And MOORE, A.P.: 'A Security Policy and Formal Top Level Specification for a Multilevel Secure Local Area Network', Proc. 1986 IEEE Symp. on Security and Privacy, 7-9, April 1986, Oakland, CA
-
-
McHugh, J.1
-
7
-
-
0019080452
-
-
pp. 729-729
-
WILLIAMS, H.C.: 'A modification of the RSA public-key encryption procedure', IEEE Trans. Inf. Theory, 1980, IT-26, (6), pp. 729-729
-
'A Modification of the RSA Public-key Encryption Procedure', IEEE Trans. Inf. Theory, 1980, IT-26, (6)
-
-
Williams, H.C.1
-
8
-
-
0020194569
-
-
905907, 1982
-
QUISQUATER, J.J., and COUVREUR, C.: 'Fast decipherment algorithm for RSA public-key cryptoSystem', Electron. Lett., 18, pp. 905907, 1982
-
And COUVREUR, C.: 'Fast Decipherment Algorithm for RSA Public-key CryptoSystem', Electron. Lett., 18, Pp.
-
-
Quisquater, J.J.1
-
9
-
-
84976752387
-
-
(3), pp.239-247
-
AKL, S.O., and TAYLOR, P.D.: 'Cryptographic solution to a problem of access control in a hierarchy', ACM Trans. Comput. Syst., 1983, 1, (3), pp.239-247
-
And TAYLOR, P.D.: 'Cryptographic Solution to a Problem of Access Control in a Hierarchy', ACM Trans. Comput. Syst., 1983, 1
-
-
Akl, S.O.1
-
10
-
-
0022115074
-
-
pp. 797-802
-
MacKINNON, ST., TAYLOR, P.D., MEIJER, H., and AKL, S.G.: 'An optimal algorithm for assigning cryptographic keys to control access in a hierarchy', IEEE Trans. Comput., 1985, C-34, (9), pp. 797-802
-
TAYLOR, P.D., MEIJER, H., and AKL, S.G.: 'An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy', IEEE Trans. Comput., 1985, C-34, (9)
-
-
MacKinnon, S.T.1
-
11
-
-
0000954459
-
-
pp. 539-546
-
HARN, L., and LIN, H.Y.: 'A cryptographic key generation scheme for multilevel data security', Comput. Secur., 1990, 9, pp. 539-546
-
And LIN, H.Y.: 'A Cryptographic Key Generation Scheme for Multilevel Data Security', Comput. Secur., 1990, 9
-
-
Harn, L.1
-
12
-
-
38249003211
-
-
pp. 71-76
-
CHANG, C.C., and BUEHRER, D.J.: 'Access control in a hierarchy using a one-way trapdoor function', Comput. Math. withAppl., 1993,26, (5), pp. 71-76
-
And BUEHRER, D.J.: 'Access Control in a Hierarchy Using a One-way Trapdoor Function', Comput. Math. WithAppl., 1993,26, (5)
-
-
Chang, C.C.1
-
13
-
-
0001692137
-
-
pp. 243-247
-
CHANG, C.C., HWANG, R.J., and WU, T.C.: 'Cryptographic key assignment scheme for access control in a hierarchy', Inf. Syst., 1992, 17, (3), pp. 243-247
-
HWANG, R.J., and WU, T.C.: 'Cryptographic Key Assignment Scheme for Access Control in a Hierarchy', Inf. Syst., 1992, 17, (3)
-
-
Chang, C.C.1
-
14
-
-
84894043862
-
-
pp. 316-422
-
CHICK, G.G., and TAVARES, S.E.: 'Flexible access control with master keys', m 'Advances in Cryptology - CRYPTO'89, Springer-Verlag, 1990, pp. 316-422
-
And TAVARES, S.E.: 'Flexible Access Control with Master Keys', M 'Advances in Cryptology - CRYPTO'89, Springer-Verlag, 1990
-
-
Chick, G.G.1
-
16
-
-
0029210438
-
-
pp. 857-959
-
TSAI, H.M., and CHANG, C.C.: 'A cryptographic implementation for dynamic access control in a user hierarchy', Comput. Secur. 1995, 14, (2), pp. 857-959
-
And CHANG, C.C.: 'A Cryptographic Implementation for Dynamic Access Control in a User Hierarchy', Comput. Secur. 1995, 14, (2)
-
-
Tsai, H.M.1
-
17
-
-
0029292250
-
-
pp. 92-99
-
WU, T.C., WU..T.S., and HE, W.H.: 'Dynamic access control scheme based on the Chinese remainder theorem', Comput. Syst. Sei. Eng., 1995, 10, (2), pp. 92-99
-
WU..T.S., and HE, W.H.: 'Dynamic Access Control Scheme Based on the Chinese Remainder Theorem', Comput. Syst. Sei. Eng., 1995, 10, (2)
-
-
Wu, T.C.1
-
20
-
-
0004676563
-
-
pp, 422-429
-
LAIH, C.S., and HWANG, T.L.: 'A branch oriented key management solution to dynamic access control in a hierarchy', IEEE Trans. So/nr. Eng., 1991, 17, (3), pp, 422-429
-
And HWANG, T.L.: 'A Branch Oriented Key Management Solution to Dynamic Access Control in a Hierarchy', IEEE Trans. So/nr. Eng., 1991, 17, (3)
-
-
Laih, C.S.1
-
21
-
-
85033514541
-
-
MA, 1981
-
KNUTH, D.E.: 'The Art of Computer Programming, Seminumerical Algorithms', 2nd edn., (Addison-Wesley, Reading, MA, 1981)
-
'The Art of Computer Programming, Seminumerical Algorithms', 2nd Edn., Addison-Wesley, Reading
-
-
Knuth, D.E.1
|