-
1
-
-
33645869144
-
-
Advanced Encryption Standard. Available from: .
-
-
-
-
2
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Akl S.G., and Taylor P.D. Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst. 1 3 (1983) 239-248
-
(1983)
ACM Trans. Comput. Syst.
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
3
-
-
13844281059
-
Efficient time-bound hierarchical key assignment scheme
-
Chien H.Y. Efficient time-bound hierarchical key assignment scheme. IEEE Trans. Knowled. Data Eng. 16 10 (2004) 1301-1304
-
(2004)
IEEE Trans. Knowled. Data Eng.
, vol.16
, Issue.10
, pp. 1301-1304
-
-
Chien, H.Y.1
-
4
-
-
5744237343
-
Cryptographic key assignment schemes for any access control policy
-
De Santis A., Ferrara A.L., and Masucci B. Cryptographic key assignment schemes for any access control policy. Inform. Process. Lett. 92 4 (2004) 199-205
-
(2004)
Inform. Process. Lett.
, vol.92
, Issue.4
, pp. 199-205
-
-
De Santis, A.1
Ferrara, A.L.2
Masucci, B.3
-
5
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
Harn L., and Lin H.Y. A cryptographic key generation scheme for multilevel data security. Comput. Security 9 6 (1990) 539-546
-
(1990)
Comput. Security
, vol.9
, Issue.6
, pp. 539-546
-
-
Harn, L.1
Lin, H.Y.2
-
6
-
-
0031194544
-
A cryptographic key assignment scheme in a hierarchy for access control
-
Hwang M.S. A cryptographic key assignment scheme in a hierarchy for access control. Math. Comput. Modell. 26 1 (1997) 27-31
-
(1997)
Math. Comput. Modell.
, vol.26
, Issue.1
, pp. 27-31
-
-
Hwang, M.S.1
-
7
-
-
0005719902
-
A dynamic cryptographic key assignment scheme in a tree structure
-
Liaw H.T., Wang S.J., and Lei C.L. A dynamic cryptographic key assignment scheme in a tree structure. Comput. Math. Appl. 25 6 (1993) 109-114
-
(1993)
Comput. Math. Appl.
, vol.25
, Issue.6
, pp. 109-114
-
-
Liaw, H.T.1
Wang, S.J.2
Lei, C.L.3
-
8
-
-
0031344109
-
Dynamic key management schemes for access control in a hierarchy
-
Lin C.H. Dynamic key management schemes for access control in a hierarchy. Comput. Commun. 20 (1997) 1381-1385
-
(1997)
Comput. Commun.
, vol.20
, pp. 1381-1385
-
-
Lin, C.H.1
-
9
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
MacKinnon S.J., Taylor P.D., Meijer H., and Akl S.G. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Trans. Comput. C-34 9 (1985) 797-802
-
(1985)
IEEE Trans. Comput.
, vol.C-34
, Issue.9
, pp. 797-802
-
-
MacKinnon, S.J.1
Taylor, P.D.2
Meijer, H.3
Akl, S.G.4
-
11
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
Sandhu R.S. Cryptographic implementation of a tree hierarchy for access control. Inform. Process. Lett. 27 (1988) 95-98
-
(1988)
Inform. Process. Lett.
, vol.27
, pp. 95-98
-
-
Sandhu, R.S.1
-
12
-
-
0041347682
-
Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy
-
Yi X., and Ye Y. Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy. IEEE Trans. Knowled. Data Eng. 15 4 (2003) 1054-1055
-
(2003)
IEEE Trans. Knowled. Data Eng.
, vol.15
, Issue.4
, pp. 1054-1055
-
-
Yi, X.1
Ye, Y.2
-
13
-
-
0036187601
-
A time-bound cryptographic key assignment scheme for access control in a hierarchy
-
Tzeng W.-G. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Trans. Knowled. Data Eng. 14 1 (2002) 182-188
-
(2002)
IEEE Trans. Knowled. Data Eng.
, vol.14
, Issue.1
, pp. 182-188
-
-
Tzeng, W.-G.1
|