-
1
-
-
0020931264
-
Cryptographic solution to a multilevel security problem
-
Akl, S. G. and Taylor, P. D. (1982). Cryptographic solution to a multilevel security problem, In: Proceedings of Crypto'82, pp. 237-249.
-
(1982)
Proceedings of Crypto'82
, pp. 237-249
-
-
Akl, S.G.1
Taylor, P.D.2
-
2
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Akl, S. G. and Taylor, P. D. (1983). Cryptographic solution to a problem of access control in a hierarchy, ACM Transactions on Computer Systems, 1, 239-248.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
3
-
-
0001692137
-
Cryptographic key assignment scheme for access control in a hierarchy
-
Chang, C. C., Hwang, R. J. and Wu, T. C. (1992). Cryptographic key assignment scheme for access control in a hierarchy, Information Systems, 17, 243-247.
-
(1992)
Information Systems
, vol.17
, pp. 243-247
-
-
Chang, C.C.1
Hwang, R.J.2
Wu, T.C.3
-
5
-
-
0024012004
-
The first ten years of public-key cryptography
-
Diffie, W. (1980). The first ten years of public-key cryptography, Proceedings of the IEEE, 76, 560-577.
-
(1980)
Proceedings of the IEEE
, vol.76
, pp. 560-577
-
-
Diffie, W.1
-
7
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
Harn, L. and Lin, H. Y. (1990). A cryptographic key generation scheme for multilevel data security, Computers and Security, 9, 539-546.
-
(1990)
Computers and Security
, vol.9
, pp. 539-546
-
-
Harn, L.1
Lin, H.Y.2
-
8
-
-
0027699915
-
Modified chang-hwang-wu access control scheme
-
Hwang, M. S., Chang, C. C. and Yang, W. P. (1993). Modified chang-hwang-wu access control scheme, IEE Electronics Letters, 29, 2095-2096.
-
(1993)
IEE Electronics Letters
, vol.29
, pp. 2095-2096
-
-
Hwang, M.S.1
Chang, C.C.2
Yang, W.P.3
-
9
-
-
0031194544
-
A cryptographic key assignment scheme in a hierarchy for access control
-
Hwang, M. S. (1997). A cryptographic key assignment scheme in a hierarchy for access control, To appear in Mathematical and Computer Modelling.
-
(1997)
Mathematical and Computer Modelling
-
-
Hwang, M.S.1
-
10
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
Mackinnon, S. J., Taylor, P. D., Meijer, H. and Akl, S. G. (1985). An optimal algorithm for assigning cryptographic keys to control access in a hierarchy, IEEE Transactions on Computers, 34, 797-802.
-
(1985)
IEEE Transactions on Computers
, vol.34
, pp. 797-802
-
-
Mackinnon, S.J.1
Taylor, P.D.2
Meijer, H.3
Akl, S.G.4
-
11
-
-
0024014116
-
Protocol failures in cryptosystems
-
Moore, J. H. (1988). Protocol failures in cryptosystems, Proceedings of IEEE, 76, 594-602.
-
(1988)
Proceedings of IEEE
, vol.76
, pp. 594-602
-
-
Moore, J.H.1
-
12
-
-
0003614758
-
Digitalized signatures and public-key functions as intractable as factorization
-
Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, Mass.
-
Rabin, M. O. (1979). Digitalized signatures and public-key functions as intractable as factorization, Technical Report MIT/LCS/TR-212, Laboratory for Computer Science, Massachusetts Institute of Technology, Cambridge, Mass.
-
(1979)
Technical Report MIT/LCS/TR-212
-
-
Rabin, M.O.1
-
13
-
-
0017930809
-
A method for obtaining digital signatures and public key cryptosystems
-
Rivest, R. L., Shamir, A. and Adleman, L. (1978). A method for obtaining digital signatures and public key cryptosystems, Communications of the ACM, 21, 120-126.
-
(1978)
Communications of the ACM
, vol.21
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
14
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
Sandhu, R. S. (1988). Cryptographic implementation of a tree hierarchy for access control, Information Processing Letters, 27, 95-98.
-
(1988)
Information Processing Letters
, vol.27
, pp. 95-98
-
-
Sandhu, R.S.1
-
15
-
-
0342731629
-
A cryptographic key assignment scheme for access control in partially-ordered hierarchies
-
Yang, W. P., Hwang, M. S. and Lee, C. L. (1993). A cryptographic key assignment scheme for access control in partially-ordered hierarchies, In: Proceedings of the Third Conference on Information Security, pp. 2.1-2.13.
-
(1993)
Proceedings of the Third Conference on Information Security
, pp. 21-213
-
-
Yang, W.P.1
Hwang, M.S.2
Lee, C.L.3
|