-
1
-
-
31444441499
-
Elliptic curve cryptography engineering
-
Cilardo A., Coppolino L., Mazzocca N., and Romano L. Elliptic curve cryptography engineering. Proceedings of the IEEE 94 2 (2006) 395-406
-
(2006)
Proceedings of the IEEE
, vol.94
, Issue.2
, pp. 395-406
-
-
Cilardo, A.1
Coppolino, L.2
Mazzocca, N.3
Romano, L.4
-
3
-
-
33746681250
-
-
A.D. Santis, A.L. Ferrara, B. Masucci, A new key assignment scheme for access control in a complete tree hierarchy, in: Proceeding of the International Workshop on Coding and Cryptography-WCC 2005, LNCS 3969, 2006, pp. 202-217.
-
-
-
-
4
-
-
5744237343
-
Cryptographic key assignment schemes for any access control policy
-
Nov
-
Santis A.D., Ferrara A.L., and Masucci B. Cryptographic key assignment schemes for any access control policy. Information Processing Letters 92 4 (2004) 199-205 Nov
-
(2004)
Information Processing Letters
, vol.92
, Issue.4
, pp. 199-205
-
-
Santis, A.D.1
Ferrara, A.L.2
Masucci, B.3
-
5
-
-
33645890580
-
Enforcing the security of a time-bound hierarchical key assignment scheme
-
June
-
Santis A.D., Ferrara A.L., and Masucci B. Enforcing the security of a time-bound hierarchical key assignment scheme. Information Sciences 176 12 (2006) 1684-1694 June
-
(2006)
Information Sciences
, vol.176
, Issue.12
, pp. 1684-1694
-
-
Santis, A.D.1
Ferrara, A.L.2
Masucci, B.3
-
6
-
-
3042595322
-
-
C.C. Chang, I.C. Lin, H.M. Tsai, H.H. Wang, A key assignment scheme for controlling access in partially ordered user hierarchies, in: Proceedings of the 18th IEEE International Conference on Advanced Information Networking and Applications (AINA2004), Fukuoka, Japan, vol. 2, March 2004, pp. 376-379.
-
-
-
-
7
-
-
0031344109
-
Dynamic key management schemes for access control in a hierarchy
-
Lin C.H. Dynamic key management schemes for access control in a hierarchy. Computer Communications 20 15 (1997) 1381-1385
-
(1997)
Computer Communications
, vol.20
, Issue.15
, pp. 1381-1385
-
-
Lin, C.H.1
-
9
-
-
33745856988
-
An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem
-
Oct
-
Jeng F.G., and Wang C.M. An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem. Journal of Systems and Software 79 8 (2006) 1161-1167 Oct
-
(2006)
Journal of Systems and Software
, vol.79
, Issue.8
, pp. 1161-1167
-
-
Jeng, F.G.1
Wang, C.M.2
-
10
-
-
0033334588
-
Cryptographic key assignment scheme for dynamic access control in a user hierarchy
-
Kuo F.H., Shen V.R.L., Chen T.S., and Lai F. Cryptographic key assignment scheme for dynamic access control in a user hierarchy. IEE Proceeding-Computers and Digital Techniques 146 5 (1999) 235-240
-
(1999)
IEE Proceeding-Computers and Digital Techniques
, vol.146
, Issue.5
, pp. 235-240
-
-
Kuo, F.H.1
Shen, V.R.L.2
Chen, T.S.3
Lai, F.4
-
11
-
-
34948851528
-
-
m) Suitable for Elliptic Curve Cryptography, Oregon EUA, June 2000. Supervisor: Dr. Cetin K. Koc. Available from: .
-
-
-
-
12
-
-
0029210438
-
A cryptographic implementation for dynamic access control in a user hierarchy
-
Tsai H.M., and Chang C.C. A cryptographic implementation for dynamic access control in a user hierarchy. Computers and Security 14 2 (1995) 159-166
-
(1995)
Computers and Security
, vol.14
, Issue.2
, pp. 159-166
-
-
Tsai, H.M.1
Chang, C.C.2
-
13
-
-
0037960156
-
Key assignment for enforcing access control policy exceptions in distributed systems
-
Yeh J.H., Chow R., and Newman R. Key assignment for enforcing access control policy exceptions in distributed systems. Information Sciences 152 (2003) 63-88
-
(2003)
Information Sciences
, vol.152
, pp. 63-88
-
-
Yeh, J.H.1
Chow, R.2
Newman, R.3
-
14
-
-
33745584616
-
-
J. Wu, R. Wei, An access control scheme for partially ordered set hierarchy with provable security, in: Proceedings of SAC 2005, LNCS 3897, 2006, pp. 221-232.
-
-
-
-
15
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
Harn L., and Lin H.Y. A cryptographic key generation scheme for multilevel data security. Computers and Security 9 6 (1990) 539-546
-
(1990)
Computers and Security
, vol.9
, Issue.6
, pp. 539-546
-
-
Harn, L.1
Lin, H.Y.2
-
16
-
-
33644499446
-
-
M.A. Strangio, Efficient Diffie-Hellmann two-party key agreement protocols based on elliptic curves, in: Proceedings of the 2005 ACM Symposium on Applied Computing, 2005, pp. 324-331.
-
-
-
-
17
-
-
0038053203
-
Controlling access in large partially-ordered hierarchies using cryptographic keys
-
Hwang M.S., and Yang W.P. Controlling access in large partially-ordered hierarchies using cryptographic keys. Journal of Systems and Software 67 2 (2003) 99-107
-
(2003)
Journal of Systems and Software
, vol.67
, Issue.2
, pp. 99-107
-
-
Hwang, M.S.1
Yang, W.P.2
-
18
-
-
0043135196
-
Elliptic curve cryptosystem-The answer to strong, fast public-key cryptography for securing constrained environments
-
Vanstone S.A. Elliptic curve cryptosystem-The answer to strong, fast public-key cryptography for securing constrained environments. Information Security Technical Report 2 2 (1997) 78-87
-
(1997)
Information Security Technical Report
, vol.2
, Issue.2
, pp. 78-87
-
-
Vanstone, S.A.1
-
19
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Akl S.G., and Taylor P.D. Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems 1 3 (1983) 239-248
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
20
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
MacKinnon S.J., Taylor P.D., Meijer H., and Akl S.G. An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers 34 9 (1985) 797-802
-
(1985)
IEEE Transactions on Computers
, vol.34
, Issue.9
, pp. 797-802
-
-
MacKinnon, S.J.1
Taylor, P.D.2
Meijer, H.3
Akl, S.G.4
-
21
-
-
0036222059
-
A novel key management scheme based on discrete logarithms and polynomial interpolations
-
Shen V.R.L., and Chen T.S. A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers and Security 21 2 (2002) 164-171
-
(2002)
Computers and Security
, vol.21
, Issue.2
, pp. 164-171
-
-
Shen, V.R.L.1
Chen, T.S.2
-
22
-
-
0031248513
-
Novel cryptographic key assignment scheme for dynamic access control in a hierarchy
-
Shen V.R.L., Chen T.S., and Lai F. Novel cryptographic key assignment scheme for dynamic access control in a hierarchy. IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E80-A 10 (1997) 2035-2037
-
(1997)
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences
, vol.E80-A
, Issue.10
, pp. 2035-2037
-
-
Shen, V.R.L.1
Chen, T.S.2
Lai, F.3
|