메뉴 건너뛰기




Volumn 3358, Issue , 2004, Pages 858-865

A novel hierarchical key management scheme based on quadratic residues

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTING COMPLEXITY; DYNAMIC KEY MANAGEMENTS; EFFICIENT SCHEMES; ELLIPTIC CURVE; HIERARCHICAL KEY MANAGEMENT SCHEME; HIERARCHICAL STRUCTURES; KEY MANAGEMENT SCHEMES; LIN'S METHOD; QUADRATIC RESIDUES; RESIDUE THEOREM; S-METHOD;

EID: 33845458354     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-30566-8_99     Document Type: Article
Times cited : (10)

References (13)
  • 1
    • 0031344109 scopus 로고    scopus 로고
    • Dynamic key management schemes for access control in a hierarchy
    • C. H. Lin, "Dynamic key management schemes for access control in a hierarchy," Computer Communications, 20, 1997, pp.1381-1385.
    • (1997) Computer Communications , vol.20 , pp. 1381-1385
    • Lin, C.H.1
  • 2
    • 0032638189 scopus 로고    scopus 로고
    • Research note Comments on 'dynamic key management schemes for access control in a hierarchy'
    • N. Y. Lee and T. Hwang, "Research note Comments on 'dynamic key management schemes for access control in a hierarchy'," Computer Communications, 22, 1999, pp.87-89.
    • (1999) Computer Communications , vol.22 , pp. 87-89
    • Lee, N.Y.1    Hwang, T.2
  • 3
    • 33744483025 scopus 로고    scopus 로고
    • An Efficient Hierarchical Key Management Scheme Based on Elliptic Curves
    • October
    • C. H. Lin and J. H. Lee, "An Efficient Hierarchical Key Management Scheme Based on Elliptic Curves," Journal of Interdisciplinary Mathematics, Vol. 5, No. 3, October 2002, pp.293-301.
    • (2002) Journal of Interdisciplinary Mathematics , vol.5 , Issue.3 , pp. 293-301
    • Lin, C.H.1    Lee, J.H.2
  • 4
    • 0029514088 scopus 로고
    • Remote scheme for password authentication based on theory of quadratic residues
    • C. C. Chang, S. M. Tsu, "Remote scheme for password authentication based on theory of quadratic residues," Computer Communications, 18, 1995, pp.936-942.
    • (1995) Computer Communications , vol.18 , pp. 936-942
    • Chang, C.C.1    Tsu, S.M.2
  • 6
    • 0032628551 scopus 로고    scopus 로고
    • Research note a conference key distribution scheme based on the theory of quadratic residues
    • K. J. Tan, H. W. Zhu, "Research note A conference key distribution scheme based on the theory of quadratic residues," Computer Communications, 22, 1999, pp.735-738.
    • (1999) Computer Communications , vol.22 , pp. 735-738
    • Tan, K.J.1    Zhu, H.W.2
  • 11
    • 0000954459 scopus 로고
    • A Cryptographic Key Generation Scheme for Multi-Level Data Security
    • L. Ham, L. Y. Lin, "A Cryptographic Key Generation Scheme for Multi-Level Data Security," Computer and Security 9, 1990, pp.539-546.
    • (1990) Computer and Security , vol.9 , pp. 539-546
    • Ham, L.1    Lin, L.Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.