-
1
-
-
84976752387
-
Cryptographic Solution to a Problem of Access Control in a Hierarchy
-
S. G. Akl and P. D. Taylor, Cryptographic Solution to a Problem of Access Control in a Hierarchy, ACM Trans. on Comp. Sys., 1(3), 239-248, 1983.
-
(1983)
ACM Trans. on Comp. Sys
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
2
-
-
0003535981
-
Optimal Preprocessing for Answering On-line Product Queries
-
71/87, Inst, of Comp. Science, Tel-Aviv Univ
-
N. Alon and B. Schieber, Optimal Preprocessing for Answering On-line Product Queries, Tech. Rep. TR 71/87, Inst, of Comp. Science, Tel-Aviv Univ., 1987.
-
(1987)
Tech. Rep. TR
-
-
Alon, N.1
Schieber, B.2
-
3
-
-
33745793594
-
-
M. J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken, Dynamic and Efficient Key Management for Access Hierarchies, CERIAS Tech. Rep. TR 2006-09, Purdue Univ. Prelim, version in Proc. of the 12th ACM Conf. on Computer and Communications Security - CCS 2005, 190-201.
-
M. J. Atallah, M. Blanton, N. Fazio, and K. B. Frikken, Dynamic and Efficient Key Management for Access Hierarchies, CERIAS Tech. Rep. TR 2006-09, Purdue Univ. Prelim, version in Proc. of the 12th ACM Conf. on Computer and Communications Security - CCS 2005, 190-201.
-
-
-
-
5
-
-
34547282859
-
-
G. Ateniese, A. De Santis, A. L. Ferrara, and B. Masucci, Provably-Secure Time-Bound Hierarchical Key Assignment Schemes, in Proc. of the 13th ACM Conf. on Computer and Communications Security - CCS 2006, 288-297. Full version available as Report 2006/225 at the IACR Cryptology ePrint Archive.
-
G. Ateniese, A. De Santis, A. L. Ferrara, and B. Masucci, Provably-Secure Time-Bound Hierarchical Key Assignment Schemes, in Proc. of the 13th ACM Conf. on Computer and Communications Security - CCS 2006, 288-297. Full version available as Report 2006/225 at the IACR Cryptology ePrint Archive.
-
-
-
-
6
-
-
34548018501
-
-
H. L. Bodlaender, G. Tel, and N. Santoro, Trade-offs in Non-reversing Diameter, Nordic J. on Comput., 1, 111-134, 1994.
-
H. L. Bodlaender, G. Tel, and N. Santoro, Trade-offs in Non-reversing Diameter, Nordic J. on Comput., 1, 111-134, 1994.
-
-
-
-
7
-
-
33745166648
-
Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys
-
Proc. of Crypto
-
D. Boneh, C. Gentry, and B. Waters, Collusion Resistant Broadcast Encryption with Short Ciphertexts and Private Keys, in Proc. of Crypto 2005, LNCS, 3621, 258-275.
-
(2005)
LNCS
, vol.3621
, pp. 258-275
-
-
Boneh, D.1
Gentry, C.2
Waters, B.3
-
8
-
-
13844281059
-
Efficient Time-Bound Hierarchical Key Assignment Scheme
-
H. Y. Chien, Efficient Time-Bound Hierarchical Key Assignment Scheme, IEEE Trans. on Knowl. and Data Eng., 16(10), 1301-1034, 2004.
-
(2004)
IEEE Trans. on Knowl. and Data Eng
, vol.16
, Issue.10
, pp. 1301-1034
-
-
Chien, H.Y.1
-
9
-
-
33947630349
-
On Key Assignment for Hierarchical Access Control
-
J. Crampton, K. Martin, and P. Wild, On Key Assignment for Hierarchical Access Control, in Proc. of the 19th IEEE Computer Security Foundations Workshop - CSFW 2006, 98-111.
-
Proc. of the 19th IEEE Computer Security Foundations Workshop
, vol.CSFW 2006
, pp. 98-111
-
-
Crampton, J.1
Martin, K.2
Wild, P.3
-
10
-
-
33645890580
-
Enforcing the Security of a Time-Bound Hierarchical Key Assignment Scheme
-
A. De Santis, A. L. Ferrara, and B. Masucci, Enforcing the Security of a Time-Bound Hierarchical Key Assignment Scheme, Inf. Sci., 176(12), 1684-1694, 2006.
-
(2006)
Inf. Sci
, vol.176
, Issue.12
, pp. 1684-1694
-
-
De Santis, A.1
Ferrara, A.L.2
Masucci, B.3
-
14
-
-
0742285808
-
A New Cryptographic. Key Assignment Scheme with Time-Constraint Access Control in a Hierarchy, Comp
-
H. F. Huang and C. C. Chang, A New Cryptographic. Key Assignment Scheme with Time-Constraint Access Control in a Hierarchy, Comp. Standards & Interfaces 26, 159-166, 2004.
-
(2004)
Standards & Interfaces
, vol.26
, pp. 159-166
-
-
Huang, H.F.1
Chang, C.C.2
-
15
-
-
10044272348
-
Comments on a Cryptographic Key Assignment Scheme, Comp
-
Q. Tang and C. J. Mitchell, Comments on a Cryptographic Key Assignment Scheme, Comp. Standards & Interfaces, 27, 323-326, 2005.
-
(2005)
Standards & Interfaces
, vol.27
, pp. 323-326
-
-
Tang, Q.1
Mitchell, C.J.2
-
16
-
-
0016495233
-
Efficiency of a Good but not Linear Set Union Algorithm
-
R. E. Tarjan, Efficiency of a Good but not Linear Set Union Algorithm, Journal of the ACM, 22, 215-225, 1975.
-
(1975)
Journal of the ACM
, vol.22
, pp. 215-225
-
-
Tarjan, R.E.1
-
17
-
-
34548045692
-
Shortcutting Planar Digraphs
-
93-60, August
-
M. Thorup, Shortcutting Planar Digraphs, DIMACS Tech. Rep. 93-60, August 1993.
-
(1993)
DIMACS Tech. Rep
-
-
Thorup, M.1
-
18
-
-
0036187601
-
A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy
-
W.-G. Tzeng, A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy, IEEE Trans. on Knowl. and Data Eng., 14(1), 182-188, 2002.
-
(2002)
IEEE Trans. on Knowl. and Data Eng
, vol.14
, Issue.1
, pp. 182-188
-
-
Tzeng, W.-G.1
-
21
-
-
33745780944
-
An RSA-Based Time-Bound Hierarchical Key Assignment Scheme for Electronic Article Subscription
-
J. Yeh, An RSA-Based Time-Bound Hierarchical Key Assignment Scheme for Electronic Article Subscription, in Proc. of the ACM Int. Conf. on Inf. and Knowl. Management -CIKM 2005, 285-286.
-
(2005)
Proc. of the ACM Int. Conf. on Inf. and Knowl. Management -CIKM
, pp. 285-286
-
-
Yeh, J.1
-
22
-
-
33947655924
-
Security of Chien's Efficient Time-Bound Hierarchical Key Assignment Scheme
-
X. Yi, Security of Chien's Efficient Time-Bound Hierarchical Key Assignment Scheme, IEEE Trans. on Knowl. and Data Eng., 17(9), 1298-1299, 2005.
-
(2005)
IEEE Trans. on Knowl. and Data Eng
, vol.17
, Issue.9
, pp. 1298-1299
-
-
Yi, X.1
-
23
-
-
0041347682
-
Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy
-
X. Yi and Y. Ye, Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy, IEEE Trans. on Knowl. and Data Eng., 15(4), 1054 -1055, 2003.
-
(2003)
IEEE Trans. on Knowl. and Data Eng
, vol.15
, Issue.4
, pp. 1054-1055
-
-
Yi, X.1
Ye, Y.2
-
24
-
-
32844471813
-
-
S.-Y. Wang and C.-Laih, Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme, IEEE Trans. on Dep. and Secure Coinput., 3(1), 2006.
-
S.-Y. Wang and C.-Laih, Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme, IEEE Trans. on Dep. and Secure Coinput., 3(1), 2006.
-
-
-
|