-
1
-
-
84976752387
-
Cryptographic solution to a problem of access controls in a hierarchy
-
S.G Akl and P.D.Tayior, Cryptographic solution to a problem of access controls in a hierarchy, ACM Trans.Comput. Syst., 1983(1), no.3, pp. 239-247.
-
(1983)
ACM Trans.Comput. Syst.
, vol.1
, Issue.3
, pp. 239-247
-
-
Akl, S.G.1
Tayior, P.D.2
-
2
-
-
0022115074
-
An optimal algorithm for assigning cryptography keys to control access in a hierarchy
-
S.T. Mackinnon, P.D.Taylor, H.Meijer, and S.G Akl, An optimal algorithm for assigning cryptography keys to control access in a hierarchy, IEEE Trans.Comput. 1985, C-34, no.9, pp.797-802.
-
(1985)
IEEE Trans.Comput.
, vol.C-34
, Issue.9
, pp. 797-802
-
-
Mackinnon, S.T.1
Taylor, P.D.2
Meijer, H.3
Akl, S.G.4
-
3
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
L.Harn and H.Y.Lin, A cryptographic key generation scheme for multilevel data security, Comput. & Secur., 1990(9), pp.539-546.
-
(1990)
Comput. & Secur.
, vol.9
, pp. 539-546
-
-
Harn, L.1
Lin, H.Y.2
-
4
-
-
0001692137
-
Cryptographic Key Assignment Scheme for Access Control in a Hierarchy
-
C. C.Chang, R. J.Hwang, and T. C.Wu, Cryptographic Key Assignment Scheme for Access Control in a Hierarchy, Information Systems, 1992,Vol. 17, No. 3, pp. 243-247.
-
(1992)
Information Systems
, vol.17
, Issue.3
, pp. 243-247
-
-
Chang, C.C.1
Hwang, R.J.2
Wu, T.C.3
-
5
-
-
38249003211
-
Access Control in a Hierarchy Using a One-Way Trap Door Function
-
C. C.Chang, and D. J Buehrer, Access Control in a Hierarchy Using a One-Way Trap Door Function, Comput. and Math. Appli., 1993, Vol. 26, No. 5, pp. 71-76.
-
(1993)
Comput. and Math. Appli.
, vol.26
, Issue.5
, pp. 71-76
-
-
Chang, C.C.1
Buehrer, D.J.2
-
6
-
-
0002360145
-
Controlling Access in Tree Hierarchies
-
T. C.Wu, and C. C.Chang, Controlling Access in Tree Hierarchies, Inform. Science., 1994, Vol. 78, pp. 69-76.
-
(1994)
Inform. Science.
, vol.78
, pp. 69-76
-
-
Wu, T.C.1
Chang, C.C.2
-
7
-
-
0033334588
-
Cryptographic key assignment scheme for dynamic access control in a user hierarchy
-
Sep.
-
F.H.Kuo, V.R.Shen, T.S.Chen, F.Lai, Cryptographic key assignment scheme for dynamic access control in a user hierarchy, IEE Proc.-Computers & Digital Techniques, Sep. 1999, Vol.146, No.5, pp.235-240.
-
(1999)
IEE Proc.-computers & Digital Techniques
, vol.146
, Issue.5
, pp. 235-240
-
-
Kuo, F.H.1
Shen, V.R.2
Chen, T.S.3
Lai, F.4
-
8
-
-
0027641891
-
Privacy and authentication on portable communications system
-
M.Beller, L.Chang, and Y.Yacobi, Privacy and authentication on portable communications system, IEEE J.SAC, 1993, Vol.11, No.6, pp.821-829.
-
(1993)
IEEE J.SAC
, vol.11
, Issue.6
, pp. 821-829
-
-
Beller, M.1
Chang, L.2
Yacobi, Y.3
-
9
-
-
0031682831
-
Efficient key distribution for slow computing devices: Achieving fast over-the-air activation for wireless systems
-
May 3-6 '98, Oakland, CA
-
Y. Tsiounis, Y. Frankel, and C. Carroll, Efficient key distribution for slow computing devices: Achieving fast over-the-air activation for wireless systems, IEEE Symposium on Security and Privacy (S&P '98), May 3-6 '98, Oakland, CA.
-
IEEE Symposium on Security and Privacy (S&P'98)
-
-
Tsiounis, Y.1
Frankel, Y.2
Carroll, C.3
-
11
-
-
0030110285
-
Hybrid Method for Modular Exponentiation with Precomputation
-
Mar.
-
C. Y Chen, C. C. Chang, and W. P.Yang, Hybrid Method for Modular Exponentiation with Precomputation, IEE Electronics Letters, Mar. 1996, Vol. 32, No. 6, pp. 540-541.
-
(1996)
IEE Electronics Letters
, vol.32
, Issue.6
, pp. 540-541
-
-
Chen, C.Y.1
Chang, C.C.2
Yang, W.P.3
-
12
-
-
0001868672
-
Optimal asymetric encryption-how to encrypt with RSA
-
Springer-Verlag
-
M.Bellare, P.Rogaway, Optimal asymetric encryption-how to encrypt with RSA. Proceeding of Eurocrypt'94, LNCS vol.750. Springer-Verlag. 1994
-
(1994)
Proceeding of Eurocrypt'94, LNCS
, vol.750
-
-
Bellare, M.1
Rogaway, P.2
|