-
1
-
-
0020931264
-
Cryptographic solution to a multilevel security problem
-
S.G. Akl, and P.D. Taylor Cryptographic solution to a multilevel security problem D. Chaum, R.L. Rivest, A.T. Sherman, Advances in Cryptology 1982 237 249
-
(1982)
Advances in Cryptology
, pp. 237-249
-
-
Akl, S.G.1
Taylor, P.D.2
-
2
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
S.G. Akl, and P.D. Taylor Cryptographic solution to a problem of access control in a hierarchy ACM Transaction on Computer Systems 1 3 1983 239 248
-
(1983)
ACM Transaction on Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
4
-
-
38849139678
-
Reducing inference control to access control for normalized database schemas
-
J. Biskup, D.W. Embley, and J.H. Lochner Reducing inference control to access control for normalized database schemas Information Processing Letters 106 1 2008 8 12
-
(2008)
Information Processing Letters
, vol.106
, Issue.1
, pp. 8-12
-
-
Biskup, J.1
Embley, D.W.2
Lochner, J.H.3
-
6
-
-
32644451622
-
A new solution for assigning cryptographic keys to control access in mobile agent environments
-
C.C. Chang, and I.C. Lin A new solution for assigning cryptographic keys to control access in mobile agent environments Wireless Communications and Mobile Computing 6 1 2006 137 146
-
(2006)
Wireless Communications and Mobile Computing
, vol.6
, Issue.1
, pp. 137-146
-
-
Chang, C.C.1
Lin, I.C.2
-
7
-
-
0001692137
-
Cryptographic key assignment scheme for access control in a hierarchy
-
C.C. Chang, R.J. Hwang, and T.C. Wu Cryptographic key assignment scheme for access control in a hierarchy Information Systems 17 3 1992 243 247
-
(1992)
Information Systems
, vol.17
, Issue.3
, pp. 243-247
-
-
Chang, C.C.1
Hwang, R.J.2
Wu, T.C.3
-
8
-
-
3042595322
-
A key assignment scheme for controlling access in partially ordered user hierarchies
-
Fukuoka, Japan
-
C.C. Chang, I.C. Lin, H.M. Tsai, and H.H. Wang A key assignment scheme for controlling access in partially ordered user hierarchies Proceedings of the 18th IEEE International Conference on Advanced Information Networking and Applications (AINA2004), March, vol. 2 Fukuoka, Japan 2004 376 379
-
(2004)
Proceedings of the 18th IEEE International Conference on Advanced Information Networking and Applications (AINA2004), March, Vol. 2
, pp. 376-379
-
-
Chang, C.C.1
Lin, I.C.2
Tsai, H.M.3
Wang, H.H.4
-
10
-
-
34948898634
-
Access control in user hierarchy based on elliptic curve cryptosystem
-
Y.F. Chung, H.H. Lee, F. Lai, and T.S. Chen Access control in user hierarchy based on elliptic curve cryptosystem Information Sciences 178 2008 230 243
-
(2008)
Information Sciences
, vol.178
, pp. 230-243
-
-
Chung, Y.F.1
Lee, H.H.2
Lai, F.3
Chen, T.S.4
-
11
-
-
57349175668
-
New stream ciphers based on elliptic curve point multiplication
-
P.P. Deepthi, and P.S. Sathidevi New stream ciphers based on elliptic curve point multiplication Computer Communications 32 2009 25 33
-
(2009)
Computer Communications
, vol.32
, pp. 25-33
-
-
Deepthi, P.P.1
Sathidevi, P.S.2
-
12
-
-
43049173407
-
Versatile Multiplier Architectures in GF(2k) fields using the Montgomery Multiplication Algorithm
-
May
-
Fournaris, A.P., Koufopavlou, O., 2008. Versatile Multiplier Architectures in GF(2k) fields using the Montgomery Multiplication Algorithm. INTEGRATION, the VLSI Journal, 41 (May (3)), 371-384.
-
(2008)
INTEGRATION, the VLSI Journal
, vol.41
, Issue.3
, pp. 371-384
-
-
Fournaris, A.P.1
Koufopavlou, O.2
-
14
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
L. Harn, and H.Y. Lin A cryptographic key generation scheme for multilevel data security Computer Security 9 1990 539 546
-
(1990)
Computer Security
, vol.9
, pp. 539-546
-
-
Harn, L.1
Lin, H.Y.2
-
16
-
-
54349095337
-
Efficient migration for mobile computing in distributed networks
-
K.H. Huang, Y.F. Chung, C.H. Liu, F. Lai, and T.S. Chen Efficient migration for mobile computing in distributed networks Computer Standards & Interfaces 31 1 2009 40 47
-
(2009)
Computer Standards & Interfaces
, vol.31
, Issue.1
, pp. 40-47
-
-
Huang, K.H.1
Chung, Y.F.2
Liu, C.H.3
Lai, F.4
Chen, T.S.5
-
17
-
-
0038053203
-
Controlling access in large partially-ordered hierarchies using cryptographic keys
-
M.S. Hwang, and W.P. Yang Controlling access in large partially-ordered hierarchies using cryptographic keys Journal of Systems and Software 67 2 2003 99 107
-
(2003)
Journal of Systems and Software
, vol.67
, Issue.2
, pp. 99-107
-
-
Hwang, M.S.1
Yang, W.P.2
-
18
-
-
33745856988
-
An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem
-
F.G. Jeng, and C.M. Wang An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem The Journal of Systems and Software 79 2006 1161 1167
-
(2006)
The Journal of Systems and Software
, vol.79
, pp. 1161-1167
-
-
Jeng, F.G.1
Wang, C.M.2
-
21
-
-
84968503742
-
Elliptic curve cryptosystems
-
K. Koblitz Elliptic curve cryptosystems Mathematics of Computation 48 177 1987 203 209
-
(1987)
Mathematics of Computation
, vol.48
, Issue.177
, pp. 203-209
-
-
Koblitz, K.1
-
22
-
-
0348003132
-
The state of elliptic curve cryptography
-
N. Koblitz, A. Menezes, and S.A. Vanstone The state of elliptic curve cryptography Designs, Codes and Cryptography 19 2-3 2000 173 193
-
(2000)
Designs, Codes and Cryptography
, vol.19
, Issue.23
, pp. 173-193
-
-
Koblitz, N.1
Menezes, A.2
Vanstone, S.A.3
-
23
-
-
2342477274
-
Efficient access control and key management schemes for mobile agents
-
I.C. Lin, H.H. Ou, and M.S. Hwang Efficient access control and key management schemes for mobile agents Computer Standards & Interfaces 26 2004 423 433
-
(2004)
Computer Standards & Interfaces
, vol.26
, pp. 423-433
-
-
Lin, I.C.1
Ou, H.H.2
Hwang, M.S.3
-
24
-
-
33947675810
-
A network access control approach based on the AAA architecture and authorization attributes
-
G. Lopez, O. Canovas, A.F. Gomez, J.D. Jimenez, and R. Marin A network access control approach based on the AAA architecture and authorization attributes Journal of Network and Computer Applications 30 2007 900 919
-
(2007)
Journal of Network and Computer Applications
, vol.30
, pp. 900-919
-
-
Lopez, G.1
Canovas, O.2
Gomez, A.F.3
Jimenez, J.D.4
Marin, R.5
-
25
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
S.T. Mackinnon, and P.D. Taylor An optimal algorithm for assigning cryptographic keys to control access in a hierarchy IEEE Transaction on Computer Systems 34 9 1985 797 802
-
(1985)
IEEE Transaction on Computer Systems
, vol.34
, Issue.9
, pp. 797-802
-
-
MacKinnon, S.T.1
Taylor, P.D.2
-
27
-
-
46149115413
-
A protocol for digital signature based on the elliptic curve discrete logarithm problem
-
M. Nikooghadam, M.R. Bonyadi, E. Malekian, and A. Zakerolhosseini A protocol for digital signature based on the elliptic curve discrete logarithm problem Journal of Applied Sciences 8 10 2008 1919 1925
-
(2008)
Journal of Applied Sciences
, vol.8
, Issue.10
, pp. 1919-1925
-
-
Nikooghadam, M.1
Bonyadi, M.R.2
Malekian, E.3
Zakerolhosseini, A.4
-
31
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
R.L. Rivest, A. Shamir, and L. Adleman A method for obtaining digital signatures and public-key cryptosystems Communications of the ACM 21 2 1978 120 126
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
32
-
-
0032121340
-
Access control and key management for mobile agents
-
V. Roth, and M. Jalali access control and key management for mobile agents Computer & Graphics 22 4 1998 457 461
-
(1998)
Computer & Graphics
, vol.22
, Issue.4
, pp. 457-461
-
-
Roth, V.1
Jalali, M.2
-
33
-
-
34250306664
-
Threshold cryptography in P2P and MANETs: The case of access control
-
N. Saxena, G. Tsudik, and J.H. Yi Threshold cryptography in P2P and MANETs: the case of access control Computer Networks 51 2007 3632 3649
-
(2007)
Computer Networks
, vol.51
, pp. 3632-3649
-
-
Saxena, N.1
Tsudik, G.2
Yi, J.H.3
-
34
-
-
0036222059
-
A novel key management scheme based on discrete logarithms and polynomial interpolations
-
V.R.L. Shen, and T.S. Chen A novel key management scheme based on discrete logarithms and polynomial interpolations Computers and Security 21 2 2002 164 171
-
(2002)
Computers and Security
, vol.21
, Issue.2
, pp. 164-171
-
-
Shen, V.R.L.1
Chen, T.S.2
-
37
-
-
0043135196
-
Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments
-
S.A. Vanstone Elliptic curve cryptosystem-the answer to strong, fast public-key cryptography for securing constrained environments Information Security Technical Report 12 2 1997 78 87
-
(1997)
Information Security Technical Report
, vol.12
, Issue.2
, pp. 78-87
-
-
Vanstone, S.A.1
-
38
-
-
33745584616
-
An access control scheme for partially ordered set hierarchy with provable security
-
J. Wu, and R. Wei An access control scheme for partially ordered set hierarchy with provable security Proceedings of SAC 2005, LNCS 3897 2006 221 232
-
(2006)
Proceedings of SAC 2005, LNCS 3897
, pp. 221-232
-
-
Wu, J.1
Wei, R.2
-
40
-
-
38049032950
-
A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem
-
J.H. Yeh A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem Information Processing Letters 105 2008 117 120
-
(2008)
Information Processing Letters
, vol.105
, pp. 117-120
-
-
Yeh, J.H.1
|