메뉴 건너뛰기




Volumn , Issue , 2008, Pages 298-300

Dynamic Key management in a user Hierarchy

Author keywords

Hierarchy; Key management; One way hash function; Security group

Indexed keywords

ACCESS CONTROL; CRYPTOGRAPHY; ELECTRONIC COMMERCE; FUNCTIONS; GOVERNMENT DATA PROCESSING; MOBILE TELECOMMUNICATION SYSTEMS; PARALLEL PROCESSING SYSTEMS; PROBABILITY DENSITY FUNCTION;

EID: 58049137137     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/IWASID.2008.4688404     Document Type: Conference Paper
Times cited : (8)

References (8)
  • 1
    • 84976752387 scopus 로고
    • Cryptographic solution to a problem of access control in a hierarchy
    • S. G. AKI and P. D. Taylor, "Cryptographic solution to a problem of access control in a hierarchy", ACM TRANS. Computer Systems, vol. 1, no.3, pp. 239-248, 1983.
    • (1983) ACM TRANS. Computer Systems , vol.1 , Issue.3 , pp. 239-248
    • AKI, S.G.1    Taylor, P.D.2
  • 2
    • 0031344109 scopus 로고    scopus 로고
    • Dynamic key management schemes for access control in a hierarchy
    • C. H. Lin, "Dynamic key management schemes for access control in a hierarchy", Computer Communications, Vol 29, pp. 1381-1385, 1997.
    • (1997) Computer Communications , vol.29 , pp. 1381-1385
    • Lin, C.H.1
  • 3
    • 0031344109 scopus 로고    scopus 로고
    • Comments on dynamic key management schemes for access control in a hierarchy
    • N.Y. Lee, and T. H. wang, "Comments on dynamic key management schemes for access control in a hierarchy", Computer Communications, 22(5), pp.1381-1385, 1997.
    • (1997) Computer Communications , vol.22 , Issue.5 , pp. 1381-1385
    • Lee, N.Y.1    wang, T.H.2
  • 4
    • 0035428270 scopus 로고    scopus 로고
    • Research for Key management in Cryptosystem for Hierarchy
    • Y. Meng, S. H. Qing and K. L. Ke, "Research for Key management in Cryptosystem for Hierarchy", Journal of Software, 12(8), pp.1147-1153, 2001.
    • (2001) Journal of Software , vol.12 , Issue.8 , pp. 1147-1153
    • Meng, Y.1    Qing, S.H.2    Ke, K.L.3
  • 5
    • 0036222059 scopus 로고    scopus 로고
    • A Novel Key Management Scheme Based on Discrete Logarithms and polynomial Interpolations
    • R. L. Victor, Shen, T. S. Chen, "A Novel Key Management Scheme Based on Discrete Logarithms and polynomial Interpolations", Compute & security, vol. 21, no.2, pp.164-171, 2002.
    • (2002) Compute & security , vol.21 , Issue.2 , pp. 164-171
    • Victor, R.L.1    Shen2    Chen, T.S.3
  • 6
    • 0037360568 scopus 로고    scopus 로고
    • An efficient Key Assignment Scheme Based on One-way Hash Function is a user hierarchy
    • T. S. Chen, Y. F. Chung, "An efficient Key Assignment Scheme Based on One-way Hash Function is a user hierarchy", Journal on Computer Science & Technology, vol.18,no 2, pp.210-213,2003.
    • (2003) Journal on Computer Science & Technology , vol.18 , Issue.2 , pp. 210-213
    • Chen, T.S.1    Chung, Y.F.2
  • 7
    • 10444280844 scopus 로고    scopus 로고
    • An Novel Key management Scheme for Dynamic Access Control in a user hierarchy
    • T. S. Chen, Y. F. Chung, "An Novel Key management Scheme for Dynamic Access Control in a user hierarchy", Applied Mathematics and Computation, no 162, pp339-351, 2005.
    • (2005) Applied Mathematics and Computation , Issue.162 , pp. 339-351
    • Chen, T.S.1    Chung, Y.F.2
  • 8
    • 10644259523 scopus 로고    scopus 로고
    • Access Control in a Hierarchy Using One-way Hash Functions
    • C. G Yang, C. L. Li, "Access Control in a Hierarchy Using One-way Hash Functions", Computer & Security, vol.23, pp.659-664, 2004.
    • (2004) Computer & Security , vol.23 , pp. 659-664
    • Yang, C.G.1    Li, C.L.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.