-
1
-
-
84976752387
-
Cryptographic Solution to a Problem of Access Control in a Hierarchy
-
S. G. Akl and P. D. Taylor. Cryptographic Solution to a Problem of Access Control in a Hierarchy. ACM Transactions on Computer Systems, 1(3):293-248, 1983.
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 293-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
3
-
-
0037623983
-
Identity-Based Encryption from the Weil Pairing
-
D. Boneh and M. Franklin. Identity-Based Encryption from the Weil Pairing. SIAM J. of Computing, 32(3):586-615, 2003.
-
(2003)
SIAM J. of Computing
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
33847248404
-
-
Extended Abstract in Proceedings of Crypto 2001, pp. 213-229, 2001.
-
Extended Abstract in Proceedings of Crypto 2001, pp. 213-229, 2001.
-
-
-
-
6
-
-
0003593599
-
-
RFC 2693, September
-
C. Ellison, B. Frantz, B. Lampson, R. Rivest, B. Thomas, and T. Ylonen. SPKI Certificate Theory. RFC 2693, September 1999.
-
(1999)
SPKI Certificate Theory
-
-
Ellison, C.1
Frantz, B.2
Lampson, B.3
Rivest, R.4
Thomas, B.5
Ylonen, T.6
-
7
-
-
0348183205
-
Project Aura: Towards Distraction-Free Pervasive Computing
-
April-June
-
D. Garlan, D. Siewiorek, A. Smailagic, and P. Steenkiste. Project Aura: Towards Distraction-Free Pervasive Computing. IEEE Pervasive Computing, 1(2):22-31, April-June 2002.
-
(2002)
IEEE Pervasive Computing
, vol.1
, Issue.2
, pp. 22-31
-
-
Garlan, D.1
Siewiorek, D.2
Smailagic, A.3
Steenkiste, P.4
-
9
-
-
33847316039
-
-
S. A. C. Group. IBE Secure E-mail, http://crypto.stanford.edu/ibe.
-
S. A. C. Group. IBE Secure E-mail, http://crypto.stanford.edu/ibe.
-
-
-
-
10
-
-
0000954459
-
A Cryptographic Key Generation Scheme for Multi-level Data Security
-
L. Harn and H. Y. Lin. A Cryptographic Key Generation Scheme for Multi-level Data Security. Computer & Security, 9(6):539-546, 1990.
-
(1990)
Computer & Security
, vol.9
, Issue.6
, pp. 539-546
-
-
Harn, L.1
Lin, H.Y.2
-
11
-
-
33847326702
-
-
U. Hengartner and P. Steenkiste. Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information. Technical Report CMU-CS-04-172, Computer Science Department, Carnegie Mellon University, October 2004.
-
U. Hengartner and P. Steenkiste. Exploiting Hierarchical Identity-Based Encryption for Access Control to Pervasive Computing Information. Technical Report CMU-CS-04-172, Computer Science Department, Carnegie Mellon University, October 2004.
-
-
-
-
14
-
-
33847265770
-
-
S. S. Ltd. Multiprecision Integer and Rational Arithmetic C/C++ Library (MIRACL). http://indigo.ie/~mscott/.
-
S. S. Ltd. Multiprecision Integer and Rational Arithmetic C/C++ Library (MIRACL). http://indigo.ie/~mscott/.
-
-
-
-
16
-
-
0023962708
-
Cryptographic Implementation of a Tree Hierarchy for Access Control
-
R. S. Sandhu. Cryptographic Implementation of a Tree Hierarchy for Access Control. Information Processing Letters, 27(2):95-98, 1988.
-
(1988)
Information Processing Letters
, vol.27
, Issue.2
, pp. 95-98
-
-
Sandhu, R.S.1
-
17
-
-
14844297376
-
ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption
-
October
-
D. Yao, Y. Dodis, N. Fazio, and A. Lysyanskaya. ID-Based Encryption for Complex Hierarchies with Applications to Forward Security and Broadcast Encryption. In Proceedings of Ilth ACM Conference on Computer and Communications Security (CCS 2004), pages 354-363, October 2004.
-
(2004)
Proceedings of Ilth ACM Conference on Computer and Communications Security (CCS 2004)
, pp. 354-363
-
-
Yao, D.1
Dodis, Y.2
Fazio, N.3
Lysyanskaya, A.4
|