메뉴 건너뛰기




Volumn , Issue , 2003, Pages 942-945

Access Key Distribution Scheme for Level-based Hierarchy

Author keywords

Access control; CRT; Cryptosystem; Hash function; Key distribution

Indexed keywords

ALGORITHMS; GRAPHIC METHODS; HIERARCHICAL SYSTEMS; PROBLEM SOLVING; PUBLIC KEY CRYPTOGRAPHY; SEMANTICS; THEOREM PROVING;

EID: 1642488872     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (11)

References (13)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access controls in a hierarchy
    • S.G Akl and P.D.Tayior, Cryptographic solution to a problem of access controls in a hierarchy, ACM Trans.Comput. Syst., 1983(1), no.3, pp. 239-247.
    • (1983) ACM Trans.Comput. Syst. , vol.1 , Issue.3 , pp. 239-247
    • Akl, S.G.1    Tayior, P.D.2
  • 2
    • 0022115074 scopus 로고
    • An optimal algorithm for assigning cryptography keys to control access in a hierarchy
    • S.T. Mackinnon, P.D.Taylor, H.Meijer, and S.G Akl, An optimal algorithm for assigning cryptography keys to control access in a hierarchy, IEEE Trans.Comput. 1985, C-34, no.9, pp.797-802.
    • (1985) IEEE Trans.Comput. , vol.C-34 , Issue.9 , pp. 797-802
    • Mackinnon, S.T.1    Taylor, P.D.2    Meijer, H.3    Akl, S.G.4
  • 3
    • 0000954459 scopus 로고
    • A cryptographic key generation scheme for multilevel data security
    • L.Harn and H.Y.Lin, A cryptographic key generation scheme for multilevel data security, Comput. & Secur., 1990(9), pp.539-546.
    • (1990) Comput. & Secur. , vol.9 , pp. 539-546
    • Harn, L.1    Lin, H.Y.2
  • 4
    • 0001692137 scopus 로고
    • Cryptographic Key Assignment Scheme for Access Control in a Hierarchy
    • C. C.Chang, R. J.Hwang, and T. C.Wu, Cryptographic Key Assignment Scheme for Access Control in a Hierarchy, Information Systems, 1992,Vol. 17, No. 3, pp. 243-247.
    • (1992) Information Systems , vol.17 , Issue.3 , pp. 243-247
    • Chang, C.C.1    Hwang, R.J.2    Wu, T.C.3
  • 5
    • 38249003211 scopus 로고
    • Access Control in a Hierarchy Using a One-Way Trap Door Function
    • C. C.Chang, and D. J Buehrer, Access Control in a Hierarchy Using a One-Way Trap Door Function, Comput. and Math. Appli., 1993, Vol. 26, No. 5, pp. 71-76.
    • (1993) Comput. and Math. Appli. , vol.26 , Issue.5 , pp. 71-76
    • Chang, C.C.1    Buehrer, D.J.2
  • 6
    • 0002360145 scopus 로고
    • Controlling Access in Tree Hierarchies
    • T. C.Wu, and C. C.Chang, Controlling Access in Tree Hierarchies, Inform. Science., 1994, Vol. 78, pp. 69-76.
    • (1994) Inform. Science. , vol.78 , pp. 69-76
    • Wu, T.C.1    Chang, C.C.2
  • 7
    • 0033334588 scopus 로고    scopus 로고
    • Cryptographic key assignment scheme for dynamic access control in a user hierarchy
    • Sep.
    • F.H.Kuo, V.R.Shen, T.S.Chen, F.Lai, Cryptographic key assignment scheme for dynamic access control in a user hierarchy, IEE Proc.-Computers & Digital Techniques, Sep. 1999, Vol.146, No.5, pp.235-240.
    • (1999) IEE Proc.-computers & Digital Techniques , vol.146 , Issue.5 , pp. 235-240
    • Kuo, F.H.1    Shen, V.R.2    Chen, T.S.3    Lai, F.4
  • 8
    • 0027641891 scopus 로고
    • Privacy and authentication on portable communications system
    • M.Beller, L.Chang, and Y.Yacobi, Privacy and authentication on portable communications system, IEEE J.SAC, 1993, Vol.11, No.6, pp.821-829.
    • (1993) IEEE J.SAC , vol.11 , Issue.6 , pp. 821-829
    • Beller, M.1    Chang, L.2    Yacobi, Y.3
  • 9
    • 0031682831 scopus 로고    scopus 로고
    • Efficient key distribution for slow computing devices: Achieving fast over-the-air activation for wireless systems
    • May 3-6 '98, Oakland, CA
    • Y. Tsiounis, Y. Frankel, and C. Carroll, Efficient key distribution for slow computing devices: Achieving fast over-the-air activation for wireless systems, IEEE Symposium on Security and Privacy (S&P '98), May 3-6 '98, Oakland, CA.
    • IEEE Symposium on Security and Privacy (S&P'98)
    • Tsiounis, Y.1    Frankel, Y.2    Carroll, C.3
  • 11
    • 0030110285 scopus 로고    scopus 로고
    • Hybrid Method for Modular Exponentiation with Precomputation
    • Mar.
    • C. Y Chen, C. C. Chang, and W. P.Yang, Hybrid Method for Modular Exponentiation with Precomputation, IEE Electronics Letters, Mar. 1996, Vol. 32, No. 6, pp. 540-541.
    • (1996) IEE Electronics Letters , vol.32 , Issue.6 , pp. 540-541
    • Chen, C.Y.1    Chang, C.C.2    Yang, W.P.3
  • 12
    • 0001868672 scopus 로고
    • Optimal asymetric encryption-how to encrypt with RSA
    • Springer-Verlag
    • M.Bellare, P.Rogaway, Optimal asymetric encryption-how to encrypt with RSA. Proceeding of Eurocrypt'94, LNCS vol.750. Springer-Verlag. 1994
    • (1994) Proceeding of Eurocrypt'94, LNCS , vol.750
    • Bellare, M.1    Rogaway, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.