-
1
-
-
84863200393
-
A Password-Based User Authentication Scheme for the Integrated EPR Information System
-
10.1007/s10916-010-9527-7
-
Wu, Z., Chung, Y., Lai, F., Chen, T., A Password-Based User Authentication Scheme for the Integrated EPR Information System. J Med Syst, 2010. doi: 10.1007/s10916-010-9527-7.
-
(2010)
J Med Syst
-
-
Wu, Z.1
Chung, Y.2
Lai, F.3
Chen, T.4
-
2
-
-
77956061440
-
Efficient Utilization of Elliptic Curve Cryptosystem for Hierarchical Access Control
-
10.1016/j.jss.2010.05.072
-
Nikooghadam, M., Zakerolhosseini, A., Moghaddam, M.E., Efficient Utilization of Elliptic Curve Cryptosystem for Hierarchical Access Control. The Journal of Systems and Software, 2010. doi: 10.1016/j.jss.2010.05.072.
-
(2010)
The Journal of Systems and Software
-
-
Nikooghadam, M.1
Zakerolhosseini, A.2
Moghaddam, M.E.3
-
3
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
10.1145/357369.357372
-
Akl, S.G., Taylor, P.D., Cryptographic solution to a problem of access control in a hierarchy. ACM Transaction on Computer Systems 1(3):239-248, 1983.
-
(1983)
ACM Transaction on Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
4
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
10.1109/TC.1985.1676635
-
Mackinnon, S.T.,Taylor, P.D., An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transaction on Computer systems 34 (9):797-802, 1985.
-
(1985)
IEEE Transaction on Computer Systems
, vol.34
, Issue.9
, pp. 797-802
-
-
MacKinnon, S.T.1
Taylor, P.D.2
-
5
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
10.1016/0167-4048(90)90132-D
-
Harn, L., Lin, H.Y., A cryptographic key generation scheme for multilevel data security. Computer Security 9:539-546, 1990.
-
(1990)
Computer Security
, vol.9
, pp. 539-546
-
-
Harn, L.1
Lin, H.Y.2
-
6
-
-
0017930809
-
A method for obtaining digital signatures and public-key cryptosystems
-
700103 0368.94005 10.1145/359340.359342
-
Rivest, R.L.,Shamir, A., Adleman, L., A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21 (2):120-126, 1978.
-
(1978)
Communications of the ACM
, vol.21
, Issue.2
, pp. 120-126
-
-
Rivest, R.L.1
Shamir, A.2
Adleman, L.3
-
7
-
-
0001692137
-
Cryptographic key assignment scheme for access control in a hierarchy
-
10.1016/0306-4379(92)90015-F
-
Chang, C.C., Hwang, R.J., Wu, T.C., Cryptographic key assignment scheme for access control in a hierarchy. Information Systems 17 (3):243-247, 1992.
-
(1992)
Information Systems
, vol.17
, Issue.3
, pp. 243-247
-
-
Chang, C.C.1
Hwang, R.J.2
Wu, T.C.3
-
8
-
-
38249003211
-
Access control in a hierarchy using a one-way trapdoor function
-
0784.93008 10.1016/0898-1221(93)90075-7
-
Chang, C.C., Buehrer, D.J., Access control in a hierarchy using a one-way trapdoor function. Computers and Mathematics with Applications 26 (5):71-76, 1993.
-
(1993)
Computers and Mathematics with Applications
, vol.26
, Issue.5
, pp. 71-76
-
-
Chang, C.C.1
Buehrer, D.J.2
-
9
-
-
0036920852
-
A practical key management scheme for access control in a user hierarchy
-
10.1016/S0167-4048(02)00815-5
-
Zhong, S., A practical key management scheme for access control in a user hierarchy. Computers & Security 21(8):750-759, 2002.
-
(2002)
Computers & Security
, vol.21
, Issue.8
, pp. 750-759
-
-
Zhong, S.1
-
10
-
-
3042595322
-
A key assignment scheme for controlling access in partially ordered user hierarchies
-
Chang, C.C., Lin, I.C., Tsai, H.M., Wang, H.H., A key assignment scheme for controlling access in partially ordered user hierarchies. In Proc. of the 18th IEEE International Conference on Advanced Information Networking and Applications (AINA2004), vol. 2, pp. 376-379, 2004.
-
(2004)
Proc. of the 18th IEEE International Conference on Advanced Information Networking and Applications (AINA2004)
, vol.2
, pp. 376-379
-
-
Chang, C.C.1
Lin, I.C.2
Tsai, H.M.3
Wang, H.H.4
-
11
-
-
33745584616
-
An access control scheme for partially ordered set hierarchy with provable security
-
Wu, J., Wei, R., An access control scheme for partially ordered set hierarchy with provable security. In of SAC 2005, LNCS 3897, pp. 221-232, 2006.
-
(2006)
SAC 2005, LNCS
, vol.3897
, pp. 221-232
-
-
Wu, J.1
Wei, R.2
-
12
-
-
0035364917
-
Hierarchical access control using the secure filter
-
Wu, K.P., Ruan, S.J., Tseng, C.K., Lai, F.P., Hierarchical access control using the secure filter. IEICE Transactions on Information & Systems E84-D(6):700-707, 2001.
-
(2001)
IEICE Transactions on Information & Systems
, vol.84 D
, Issue.6
, pp. 700-707
-
-
Wu, K.P.1
Ruan, S.J.2
Tseng, C.K.3
Lai, F.P.4
-
13
-
-
0036222059
-
A novel key management scheme based on discrete logarithms and polynomial interpolations
-
10.1016/S0167-4048(02)00211-0
-
Shen, V.R.L., Chen, T.S., A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers and Security 21(2):164-171, 2002.
-
(2002)
Computers and Security
, vol.21
, Issue.2
, pp. 164-171
-
-
Shen, V.R.L.1
Chen, T.S.2
-
14
-
-
32644451622
-
A new solution for assigning cryptographic keys to control access in mobile agent environments
-
501605 10.1002/wcm.276
-
Chang, C.C., Lin, I.C., A new solution for assigning cryptographic keys to control access in mobile agent environments. Wireless Communications and Mobile Computing 6(1):137-146, 2006.
-
(2006)
Wireless Communications and Mobile Computing
, vol.6
, Issue.1
, pp. 137-146
-
-
Chang, C.C.1
Lin, I.C.2
-
15
-
-
38049032950
-
A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem
-
2381400 05686484 10.1016/j.ipl.2007.08.017
-
Yeh, J.H., A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem. Information Processing Letters 105:117-120, 2008.
-
(2008)
Information Processing Letters
, vol.105
, pp. 117-120
-
-
Yeh, J.H.1
-
16
-
-
0038053203
-
Controlling access in large partially-ordered hierarchies using cryptographic keys
-
10.1016/S0164-1212(02)00091-2
-
Hwang, M.S., Yang, W.P., Controlling access in large partially-ordered hierarchies using cryptographic keys. Journal of Systems and Software 67(2):99-107, 2003.
-
(2003)
Journal of Systems and Software
, vol.67
, Issue.2
, pp. 99-107
-
-
Hwang, M.S.1
Yang, W.P.2
-
17
-
-
78649817331
-
An efficient key assignment scheme for access control in a large leaf class hierarchy
-
10.1016/j.ins.2010.09.033
-
Lo, J.-W., Hwang, M.-S., Liu, C.-H., An efficient key assignment scheme for access control in a large leaf class hierarchy. Inform. Sci., 2010. doi: 10.1016/j.ins.2010.09.033.
-
(2010)
Inform. Sci.
-
-
Lo, J.-W.1
Hwang, M.-S.2
Liu, C.-H.3
-
18
-
-
11244267013
-
-
Springer-Verlag New York, USA 1059.94016
-
Hankerson, D., Menezes, A., Vanstone, S., Guide to elliptic curve cryptography, Springer-Verlag, New York, USA, 2004.
-
(2004)
Guide to Elliptic Curve Cryptography
-
-
Hankerson, D.1
Menezes, A.2
Vanstone, S.3
-
19
-
-
84968503742
-
Elliptic curve cryptosystem
-
866109 0622.94015 10.1090/S0025-5718-1987-0866109-5
-
Koblitz, N., Elliptic curve cryptosystem. Mathematics of Computation 48:203-209, 1987.
-
(1987)
Mathematics of Computation
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
20
-
-
84877582056
-
-
NIST, Recommendation on Key management. DRAFT Special Publication
-
NIST, Recommendation on Key management. DRAFT Special Publication, pp. 800-857, 2003, http://csrc.nist.gov/CryptoToolkit/kms/guideline-1-jan03.pdf.
-
(2003)
, pp. 800-857
-
-
-
22
-
-
34948898634
-
Access control in user hierarchy based on elliptic curve Cryptosystem
-
2375876 1134.94358 10.1016/j.ins.2007.08.001
-
Chung, Y.F., Lee, H.H., Lai, F., Chen, T.S., Access control in user hierarchy based on elliptic curve Cryptosystem. Information Sciences 178: 230-243, 2008.
-
(2008)
Information Sciences
, vol.178
, pp. 230-243
-
-
Chung, Y.F.1
Lee, H.H.2
Lai, F.3
Chen, T.S.4
-
23
-
-
33745856988
-
An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem
-
10.1016/j.jss.2006.01.018
-
Jeng, F.G., Wang, C.M., An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem. The Journal of Systems and Software 79:1161-1167, 2006.
-
(2006)
The Journal of Systems and Software
, vol.79
, pp. 1161-1167
-
-
Jeng, F.G.1
Wang, C.M.2
-
25
-
-
0142002511
-
The elliptic curve digital signature algorithm (ECDSA)
-
Johnson, D., Menezes, A., Vanstone, S., The elliptic curve digital signature algorithm (ECDSA). International Journal of Information Security 1(1):36-63, 2001.
-
(2001)
International Journal of Information Security
, vol.1
, Issue.1
, pp. 36-63
-
-
Johnson, D.1
Menezes, A.2
Vanstone, S.3
-
26
-
-
84877575899
-
-
Advanced Encryption Standard
-
Advanced Encryption Standard, http://www.csrc.nist.gov/archieve/aes/.
-
-
-
-
27
-
-
0142156713
-
Variations of Diffie-Hellman problem
-
Springer-Verlag, LNCS 2836
-
Bao, F., Deng, R. H., Zhu, H., Variations of Diffie-Hellman problem. In Proc. of International Conference Information and Communications Security - ICICS 2003, Springer-Verlag, LNCS 2836, pp. 301-312.
-
Proc. of International Conference Information and Communications Security - ICICS 2003
, pp. 301-312
-
-
Bao, F.1
Deng, R.H.2
Zhu, H.3
-
28
-
-
33845645839
-
-
Doctoral Thesis of Brisbane Australia: Queensland University of Technology
-
Choo K.-K. R., Key Establishment: Proofs and Refutations. Doctoral Thesis of Brisbane Australia: Queensland University of Technology, 2006.
-
(2006)
Key Establishment: Proofs and Refutations
-
-
Choo, K.-K.R.1
-
30
-
-
84948957152
-
Public-key Encryption in a Multi-User Setting: Security Proofs and Improvements
-
Springer-Verlag
-
Bellare, M., Boldyreva, A., Micali, S., Public-key Encryption in a Multi-User Setting: Security Proofs and Improvements. In Proc. of Eurocrypt 2000, LNCS 1807, Springer-Verlag, pp. 259-274, 2000.
-
(2000)
Proc. of Eurocrypt 2000, LNCS 1807
, pp. 259-274
-
-
Bellare, M.1
Boldyreva, A.2
Micali, S.3
-
31
-
-
0001940580
-
Provably Secure Session Key Distribution: The Three Party Case
-
ACM Press
-
Bellare, M., Rogaway, P., Provably Secure Session Key Distribution: The Three Party Case. In Proc. of 27th ACM Symposium on the Theory of Computing, ACM Press, pp. 57-66, 1995.
-
(1995)
Proc. of 27th ACM Symposium on the Theory of Computing
, pp. 57-66
-
-
Bellare, M.1
Rogaway, P.2
-
32
-
-
0348003132
-
The state of elliptic curve cryptography
-
1759616 0996.94032 10.1023/A:1008354106356
-
Koblitz, N., Menezes, A., Vanstone, S.A., The state of elliptic curve cryptography. Designs, Codes and Cryptography 19(2-3):173-193, 2000.
-
(2000)
Designs, Codes and Cryptography
, vol.19
, Issue.2-3
, pp. 173-193
-
-
Koblitz, N.1
Menezes, A.2
Vanstone, S.A.3
-
33
-
-
84877580061
-
-
National Institute of Standards and Technology, US Department of Commerce, Secure Hash Standard
-
National Institute of Standards and Technology, US Department of Commerce, Secure Hash Standard. US Federal Information Processing Standard Publication 180-2, 2002.
-
(2002)
US Federal Information Processing Standard Publication
, vol.180
, Issue.2
-
-
-
34
-
-
84957657892
-
Fast key exchange with elliptic curve systems
-
Schroeppel, R., Orman, H., O'Malley, S., Spatscheck, O., Fast key exchange with elliptic curve systems. In Proc. of Advances in Cryptology-CRYPTO '95, LNCS 963, pp. 43-56, 1995.
-
(1995)
Proc. of Advances in Cryptology-CRYPTO '95, LNCS 963
, pp. 43-56
-
-
Schroeppel, R.1
Orman, H.2
O'Malley, S.3
Spatscheck, O.4
-
35
-
-
84955600081
-
n )
-
Springer-Verlag
-
n ). In Proc. of Advances in Cryptology - ASIACRYPT '96, LNCS 1163, Springer-Verlag, pp. 65-76, 1996.
-
(1996)
Proc. of Advances in Cryptology - ASIACRYPT '96, LNCS 1163
, pp. 65-76
-
-
Dewin, E.1
Bosselaers, A.2
Vandenberghe, S.3
De Gersem, P.4
Vandewalle, J.5
-
36
-
-
84949187399
-
The performance measurement of cryptographic primitives on palm devices
-
Wong, D.S., Fuentes, H.H., Chan, A.H., The performance measurement of cryptographic primitives on palm devices. In Proc. of the 17th Annual Computer Security Applications Conference (ACSAC 2001), pp. 92-101, 2001.
-
(2001)
Proc. of the 17th Annual Computer Security Applications Conference (ACSAC 2001)
, pp. 92-101
-
-
Wong, D.S.1
Fuentes, H.H.2
Chan, A.H.3
|