-
1
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
S. G. Akl and P. D. Taylor. Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst., 1(3):239-248, 1983.
-
(1983)
ACM Trans. Comput. Syst
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
2
-
-
38049016958
-
Incorporating temporal capabilities in existing key management schemes
-
M. J. Atallah, M. Blanton, and K. B. Frikken. Incorporating temporal capabilities in existing key management schemes. In ESORICS, pages 515-530, 2007.
-
(2007)
ESORICS
, pp. 515-530
-
-
Atallah, M.J.1
Blanton, M.2
Frikken, K.B.3
-
3
-
-
68849116303
-
Incorporating temporal capabilities in existing key management schemes. Cryptology ePrint Archive
-
Report 2007/245
-
M. J. Atallah, M. Blanton, and K. B. Frikken. Incorporating temporal capabilities in existing key management schemes. Cryptology ePrint Archive, Report 2007/245, 2007.
-
(2007)
-
-
Atallah, M.J.1
Blanton, M.2
Frikken, K.B.3
-
4
-
-
35048891868
-
Keying hash functions for message authentication
-
M. Bellare, R. Canetti, and H. Krawczyk. Keying hash functions for message authentication. In CRYPTO, pages 1-15, 1996.
-
(1996)
CRYPTO
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
5
-
-
0031351741
-
A concrete security treatment of symmetric encryption
-
Washington, DC, USA, IEEE Computer Society
-
M. Bellare, A. Desai, E. Jokipii, and P. Rogaway. A concrete security treatment of symmetric encryption. In FOCS '97: Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS '97), page 394, Washington, DC, USA, 1997. IEEE Computer Society.
-
(1997)
FOCS '97: Proceedings of the 38th Annual Symposium on Foundations of Computer Science (FOCS '97)
, pp. 394
-
-
Bellare, M.1
Desai, A.2
Jokipii, E.3
Rogaway, P.4
-
7
-
-
34247325635
-
An efficient broadcast authentication scheme in wireless sensor networks
-
New York, NY, USA, ACM
-
S.-M. Chang, S. Shieh, W. W. Lin, and C.-M. Hsieh. An efficient broadcast authentication scheme in wireless sensor networks. In ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security, pages 311-320, New York, NY, USA, 2006. ACM.
-
(2006)
ASIACCS '06: Proceedings of the 2006 ACM Symposium on Information, computer and communications security
, pp. 311-320
-
-
Chang, S.-M.1
Shieh, S.2
Lin, W.W.3
Hsieh, C.-M.4
-
9
-
-
84979291225
-
Broadcast encryption
-
A. Fiat and M. Naor. Broadcast encryption. In CRYPTO, pages 480-491, 1993.
-
(1993)
CRYPTO
, pp. 480-491
-
-
Fiat, A.1
Naor, M.2
-
10
-
-
69949183741
-
-
J.-O. Mauborgne and G. Vernam. One time pad scheme. at http://en. wikipedia.orgAviki/One-time-pad.
-
J.-O. Mauborgne and G. Vernam. One time pad scheme. at http://en. wikipedia.orgAviki/One-time-pad.
-
-
-
-
12
-
-
24344501341
-
Access control in collaborative systems
-
W. Tolone, G.-J. Ahn, T. Pai, and S.-P. Hong. Access control in collaborative systems. ACM Comput. Surv., 37(1):29-41, 2005.
-
(2005)
ACM Comput. Surv
, vol.37
, Issue.1
, pp. 29-41
-
-
Tolone, W.1
Ahn, G.-J.2
Pai, T.3
Hong, S.-P.4
-
13
-
-
0036187601
-
A time-bound cryptographic key assignment scheme for access control in a hierarchy
-
W. G. Tzeng. A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering, 14(1):182-188, 2002.
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
, vol.14
, Issue.1
, pp. 182-188
-
-
Tzeng, W.G.1
-
15
-
-
33947655924
-
Security of chien's efficient time-bound hierarchical key assignment scheme
-
X. Yi. Security of chien's efficient time-bound hierarchical key assignment scheme. IEEE Transactions on Knowledge and Data Engineering, 17(9): 1298-1299, 2005.
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.9
, pp. 1298-1299
-
-
Yi, X.1
|