-
1
-
-
33745793594
-
Dynamic and efficient key management for access hierarchies
-
New York, NY, USA, ACM
-
Mikhail J. Atallah, Keith B. Frikken, and Marina Blanton. Dynamic and efficient key management for access hierarchies. In CCS '05: Proceedings of the 12th ACM conference on Computer and communications security, pages 190-202, New York, NY, USA, 2005. ACM.
-
(2005)
CCS '05: Proceedings of the 12th ACM conference on Computer and communications security
, pp. 190-202
-
-
Atallah, M.J.1
Frikken, K.B.2
Blanton, M.3
-
2
-
-
84957652167
-
General short computational secret sharing schemes
-
Springer Berlin and Heidelberg
-
Philippe Beguin and Antonella Cresti. General short computational secret sharing schemes. In Advances in Cryptology-EUROCRYPT'95, pages 194-208. Springer Berlin and Heidelberg, 1995.
-
(1995)
Advances in Cryptology-EUROCRYPT'95
, pp. 194-208
-
-
Beguin, P.1
Cresti, A.2
-
3
-
-
0032166974
-
Secret sharing with public reconstruction
-
IEEE
-
Amos Beimel and Benny Chor. Secret sharing with public reconstruction. In IEEE, pages 1887-1896. IEEE, 1998.
-
(1998)
IEEE
, pp. 1887-1896
-
-
Beimel, A.1
Chor, B.2
-
4
-
-
85011043313
-
Over-encryption: Management of access control evolution on outsourced data
-
S. De Capitani di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, and P. Samarati. Over-encryption: Management of access control evolution on outsourced data. In VLDB, 2007.
-
(2007)
VLDB
-
-
De Capitani di Vimercati, S.1
Foresti, S.2
Jajodia, S.3
Paraboschi, S.4
Samarati, P.5
-
5
-
-
16644381926
-
Modelling and assessing inference exposure in encrypted databases
-
New York, NY, USA, ACM
-
Alberto Ceselli et al. Modelling and assessing inference exposure in encrypted databases. In TISSEC, pages 119-152, New York, NY, USA, 2005. ACM.
-
(2005)
TISSEC
, pp. 119-152
-
-
Ceselli, A.1
-
7
-
-
58049150362
-
-
Tree-based group key agreement. Technical Report 2002/009
-
Yongdae Kim, Adrian Perrig, and Gene Tsudik. Tree-based group key agreement. Technical Report 2002/009, 2002.
-
(2002)
-
-
Kim, Y.1
Perrig, A.2
Tsudik, G.3
-
8
-
-
85009120801
-
Controlling access to published data using cryptography
-
VLDB Endowment
-
Gerome Miklau and Dan Suciu. Controlling access to published data using cryptography. In VLDB, pages 898-909. VLDB Endowment, 2003.
-
(2003)
VLDB
, pp. 898-909
-
-
Miklau, G.1
Suciu, D.2
-
9
-
-
84947770625
-
Efficient dynamic-resharing "verifiable secret sharing" against mobile adversary
-
Springer Berlin and Heidelberg
-
N.Alon, Z.Galil, and M.Yung. Efficient dynamic-resharing "verifiable secret sharing" against mobile adversary. In Algorithms-ESA'95, pages 523-537. Springer Berlin and Heidelberg, 1995.
-
(1995)
Algorithms-ESA'95
, pp. 523-537
-
-
Alon, N.1
Galil, Z.2
Yung, M.3
-
10
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
3:239-248
-
S.Akl and P.Taylor. Cryptographic solution to a problem of access control in a hierarchy. In ACM TOCS, pages 1(3):239-248, 1983.
-
(1983)
ACM TOCS
, pp. 1
-
-
Akl, S.1
Taylor, P.2
-
11
-
-
0018545449
-
How to share a secret
-
New York, NY, USA, ACM
-
Adi Shamir. How to share a secret. In Communications of the ACM, pages 612-613, New York, NY, USA, 1979. ACM.
-
(1979)
Communications of the ACM
, pp. 612-613
-
-
Shamir, A.1
-
12
-
-
38049052454
-
Preventing collusion attacks on the one-way function tree (oft) scheme
-
Xuxin Xu, Lingyu Wang, Amr M. Youssef, and Bo Zhu. Preventing collusion attacks on the one-way function tree (oft) scheme. In ACNS, pages 177-193, 2007.
-
(2007)
ACNS
, pp. 177-193
-
-
Xu, X.1
Wang, L.2
Youssef, A.M.3
Zhu, B.4
|