메뉴 건너뛰기




Volumn 1, Issue 2, 2005, Pages 103-109

Access control in networks hierarchy: Implementation of key management protocol

Author keywords

Access control; Hardware integration; Hash functions; Key management; Network authentication

Indexed keywords

EFFICIENT ARCHITECTURE; HARDWARE INTEGRATIONS; HIGH-SPEED PERFORMANCE; IN NETWORKS; KEY MANAGEMENT; KEY MANAGEMENT PROTOCOLS; MULTI-NODES; MULTIUSERS; NETWORK AUTHENTICATION; PROPOSED ARCHITECTURES; SECURITY SCHEME; SECURITY STRENGTHS; SPECIAL NEEDS; WIRED AND WIRELESS;

EID: 33847696259     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (9)

References (19)
  • 2
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • July
    • S. G. Akl and P. D. Taylor, "Cryptographic solution to a problem of access control in a hierarchy", ACM Transaction on Computer Systems, vol. 1, no. 3, pp. 239-248, July 1983.
    • (1983) ACM Transaction on Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • Akl, S.G.1    Taylor, P.D.2
  • 11
    • 84874693444 scopus 로고    scopus 로고
    • SHA-1 Standard, National Institute of Standards and Technology (NIST)FIPS PUB 180-1
    • SHA-1 Standard, National Institute of Standards and Technology (NIST), Secure Hash Standard, FIPS PUB 180-1, www.itl.nist.gov/fipspubs/fip180-1.htm, 2005.
    • (2005) Secure Hash Standard
  • 12
    • 84874693444 scopus 로고    scopus 로고
    • SHA-2 Standard, National Institute of Standards and Technology (NIST) FIPS PUB 180-2
    • SHA-2 Standard, National Institute of Standards and Technology (NIST), Secure Hash Standard, FIPS PUB 180-2, www.itl.nist.gov/fipspubs/fip180-2.htm, 2005.
    • (2005) Secure Hash Standard
  • 15
    • 8744252011 scopus 로고    scopus 로고
    • Mobile communi-cations world: security implementations aspects - A state of the art"
    • 32
    • N. Sklavos and O. Koufopavlou, "Mobile communi-cations world: security implementations aspects - A state of the art CSJM Journal: Institute of Math-ematics and Computer Science, vol. 11, no. 2 (32), pp. 168-187, 2003.
    • (2003) CSJM Journal: Institute of Math-ematics and Computer Science , vol.11 , Issue.2 , pp. 168-187
    • Sklavos, N.1    Koufopavlou, O.2
  • 18
    • 0029292250 scopus 로고
    • Dynamic access control scheme based on the Chinese remainder the-orem
    • T. C. Wu, T. S. Wu, W. H. He, "Dynamic access control scheme based on the Chinese remainder the-orem," Computer Systems: Science and Engineering, vol. 2, pp. 92-99, 1995.
    • (1995) Computer Systems: Science and Engineering , vol.2 , pp. 92-99
    • Wu, T.C.1    Wu, T.S.2    He, W.H.3
  • 19
    • 10644259523 scopus 로고    scopus 로고
    • Access control in a hierarchy us-ing one-way hash functions
    • C. Yang and C. Li, "Access control in a hierarchy us-ing one-way hash functions," Computers & Security, vol. 23, no. 8, pp. 659-664, 2004.
    • (2004) Computers & Security , vol.23 , Issue.8 , pp. 659-664
    • Yang, C.1    Li, C.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.