-
1
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems 1(3), 239-248 (1983)
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
2
-
-
0022115074
-
An optimal algorithm for assigning cryptographic keys to control access in a hierarchy
-
MacKinnon, S.J., Taylor, P.D., Meijer, H., Akl, S.G.: An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers 34(9), 797-802 (1985)
-
(1985)
IEEE Transactions on Computers
, vol.34
, Issue.9
, pp. 797-802
-
-
MacKinnon, S.J.1
Taylor, P.D.2
Meijer, H.3
Akl, S.G.4
-
3
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
Harn, L., Lin, H.Y.: A cryptographic key generation scheme for multilevel data security. Computers & Security 9(6), 539-546 (1990)
-
(1990)
Computers & Security
, vol.9
, Issue.6
, pp. 539-546
-
-
Harn, L.1
Lin, H.Y.2
-
4
-
-
0036396975
-
Hierarchical access control based on Chinese remainder theorem and symmetric algorithm
-
Chen, T.S., Chung, Y.F.: Hierarchical access control based on Chinese remainder theorem and symmetric algorithm. Computers & Security 21(6), 565-570 (2002)
-
(2002)
Computers & Security
, vol.21
, Issue.6
, pp. 565-570
-
-
Chen, T.S.1
Chung, Y.F.2
-
5
-
-
0036222059
-
A novel key management scheme based on discrete logarithms and polynomial interpolations
-
Shen, V., Chen, T.S.: A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers & Security 21(2), 164-171 (2002)
-
(2002)
Computers & Security
, vol.21
, Issue.2
, pp. 164-171
-
-
Shen, V.1
Chen, T.S.2
-
7
-
-
0013024890
-
A key assignment for enforcing access control policy exceptions
-
Yeh, J.H., Chow, R., Newman, R.: A key assignment for enforcing access control policy exceptions. In: Int. Symposium on Internet Technology, pp. 54-59 (1998)
-
(1998)
Int. Symposium on Internet Technology
, pp. 54-59
-
-
Yeh, J.H.1
Chow, R.2
Newman, R.3
-
8
-
-
33745793594
-
Dynamic and efficient key management for access hierarchies
-
Atallah, M.J., Blanton, M., Fazio, N., Frikken, K.B.: Dynamic and efficient key management for access hierarchies. In: ACM Conference on Computer and Communications Security, pp. 190-202 (2006)
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 190-202
-
-
Atallah, M.J.1
Blanton, M.2
Fazio, N.3
Frikken, K.B.4
-
9
-
-
34547282859
-
Provably-secure time-bound hierarchical key assignment schemes
-
Ateniese, G., De Santis, A., Ferrara, A.L., Masucci, B.: Provably-secure time-bound hierarchical key assignment schemes. In: ACM Conference on Computer and Communications Security, pp. 288-297 (2006)
-
(2006)
ACM Conference on Computer and Communications Security
, pp. 288-297
-
-
Ateniese, G.1
De Santis, A.2
Ferrara, A.L.3
Masucci, B.4
-
10
-
-
34247380378
-
A secure system for data access based on anonymous authentication and time-dependent hierarchical keys
-
Tzeng, W.G.: A secure system for data access based on anonymous authentication and time-dependent hierarchical keys. In: ACM Symposium on Information, Computer and Communications Security, pp. 223-230 (2006)
-
(2006)
ACM Symposium on Information, Computer and Communications Security
, pp. 223-230
-
-
Tzeng, W.G.1
-
11
-
-
32844471813
-
An efficient solution for a time-bound hierarchical key assignment scheme
-
Wang, S.Y., Laih, C.S.: An efficient solution for a time-bound hierarchical key assignment scheme. IEEE Transactions on Dependable and Secure Computing 3(1), 91-100 (2006)
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.1
, pp. 91-100
-
-
Wang, S.Y.1
Laih, C.S.2
-
12
-
-
38049077460
-
Efficient Provably-Secure Hierarchical Key Assignment Schemes
-
Kučera, L., Kučera, A. (eds.) MFCS 2007. Springer, Heidelberg
-
De Santis, A., Ferrara, A.L., Masucci, B.: Efficient Provably-Secure Hierarchical Key Assignment Schemes. In: Kučera, L., Kučera, A. (eds.) MFCS 2007. LNCS, vol. 4708, pp. 371-382. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4708
, pp. 371-382
-
-
De Santis, A.1
Ferrara, A.L.2
Masucci, B.3
-
13
-
-
60349128962
-
Dynamic and efficient key management for access hierarchies
-
Atallah, M.J., Blanton, M., Fazio, N., Frikken, K.B.: Dynamic and efficient key management for access hierarchies. ACM Trans. Inf. Syst. Secur. 12(3) (2009)
-
(2009)
ACM Trans. Inf. Syst. Secur.
, vol.12
, Issue.3
-
-
Atallah, M.J.1
Blanton, M.2
Fazio, N.3
Frikken, K.B.4
-
14
-
-
71749111864
-
Variations on a theme by Akl and Taylor: Security and tradeoffs
-
D'Arco, P., De Santis, A., Ferrara, A.L., Masucci, B.: Variations on a theme by Akl and Taylor: Security and tradeoffs. Theoretical Computer Science 411(1), 213-227 (2010)
-
(2010)
Theoretical Computer Science
, vol.411
, Issue.1
, pp. 213-227
-
-
D'Arco, P.1
De Santis, A.2
Ferrara, A.L.3
Masucci, B.4
-
15
-
-
77958469157
-
Constructing Key Assignment Schemes from Chain Partitions
-
Foresti, S., Jajodia, S. (eds.) Data and Applications Security and Privacy XXIV. Springer, Heidelberg
-
Crampton, J., Daud, R., Martin, K.M.: Constructing Key Assignment Schemes from Chain Partitions. In: Foresti, S., Jajodia, S. (eds.) Data and Applications Security and Privacy XXIV. LNCS, vol. 6166, pp. 130-145. Springer, Heidelberg (2010)
-
(2010)
LNCS
, vol.6166
, pp. 130-145
-
-
Crampton, J.1
Daud, R.2
Martin, K.M.3
-
16
-
-
79960205945
-
Provably Secure Key Assignment Schemes from Factoring
-
Parampalli, U., Hawkes, P. (eds.) ACISP 2011. Springer, Heidelberg
-
Freire, E.S.V., Paterson, K.G.: Provably Secure Key Assignment Schemes from Factoring. In: Parampalli, U., Hawkes, P. (eds.) ACISP 2011. LNCS, vol. 6812, pp. 292-309. Springer, Heidelberg (2011)
-
(2011)
LNCS
, vol.6812
, pp. 292-309
-
-
Freire, E.S.V.1
Paterson, K.G.2
-
17
-
-
84862218233
-
Provably-secure time-bound hierarchical key assignment schemes
-
Ateniese, G., De Santis, A., Ferrara, A.L., Masucci, B.: Provably-secure time-bound hierarchical key assignment schemes. J. Cryptology 25(2), 243-270 (2012)
-
(2012)
J. Cryptology
, vol.25
, Issue.2
, pp. 243-270
-
-
Ateniese, G.1
De Santis, A.2
Ferrara, A.L.3
Masucci, B.4
-
18
-
-
33947630349
-
On key assignment for hierarchical access control
-
Crampton, J., Martin, K.M., Wild, P.R.: On key assignment for hierarchical access control. In: Computer Security Foundations Workshop, pp. 98-111 (2006)
-
(2006)
Computer Security Foundations Workshop
, pp. 98-111
-
-
Crampton, J.1
Martin, K.M.2
Wild, P.R.3
-
19
-
-
35048891868
-
Keying Hash Functions for Message Authentication
-
Advances in Cryptology - CRYPTO '96
-
Bellare, M., Canetti, R., Krawczyk, H.: Keying Hash Functions for Message Authentication. In: Koblitz, N. (ed.) CRYPTO 1996. LNCS, vol. 1109, pp. 1-15. Springer, Heidelberg (1996) (Pubitemid 126106226)
-
(1996)
LECTURE NOTES in COMPUTER SCIENCE
, Issue.1109
, pp. 1-15
-
-
Bellare, M.1
Canetti, R.2
Krawczyk, H.3
-
20
-
-
4243054954
-
Number-theoretic constructions of efficient pseudo-random functions
-
Naor, M., Reingold, O.: Number-theoretic constructions of efficient pseudo-random functions. J. ACM 51(2), 231-262 (2004)
-
(2004)
J. ACM
, vol.51
, Issue.2
, pp. 231-262
-
-
Naor, M.1
Reingold, O.2
-
21
-
-
0022716288
-
A simple unpredictable pseudo-random number generator
-
Blum, L., Blum, M., Shub, M.: A simple unpredictable pseudo-random number generator. SIAM Journal on Computing 15(2), 364-383 (1986)
-
(1986)
SIAM Journal on Computing
, vol.15
, Issue.2
, pp. 364-383
-
-
Blum, L.1
Blum, M.2
Shub, M.3
-
22
-
-
84949995981
-
An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information
-
Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. Springer, Heidelberg
-
Blum, M., Goldwasser, S.: An Efficient Probabilistic Public-Key Encryption Scheme Which Hides All Partial Information. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 289-299. Springer, Heidelberg (1985)
-
(1985)
LNCS
, vol.196
, pp. 289-299
-
-
Blum, M.1
Goldwasser, S.2
-
23
-
-
35248891000
-
Forward-Security in Private-Key Cryptography
-
Joye, M. (ed.) CT-RSA 2003. Springer, Heidelberg
-
Bellare, M., Yee, B.S.: Forward-Security in Private-Key Cryptography. In: Joye, M. (ed.) CT-RSA 2003. LNCS, vol. 2612, pp. 1-18. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2612
, pp. 1-18
-
-
Bellare, M.1
Yee, B.S.2
-
24
-
-
84874304101
-
-
Freire, E.S.V., Paterson, K.G., Poettering, B.: Simple, efficient and strongly KI-secure hierarchical key assignment schemes (2012), http://eprint.iacr.org/2012/645
-
(2012)
Simple, Efficient and Strongly KI-secure Hierarchical Key Assignment Schemes
-
-
Freire, E.S.V.1
Paterson, K.G.2
Poettering, B.3
-
25
-
-
0001387789
-
A decomposition theorem for partially ordered sets
-
Dilworth, R.P.: A decomposition theorem for partially ordered sets. Annals of Mathematics 51(1), 161-166 (1950)
-
(1950)
Annals of Mathematics
, vol.51
, Issue.1
, pp. 161-166
-
-
Dilworth, R.P.1
-
26
-
-
35048839833
-
Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes
-
Franklin, M. (ed.) CRYPTO 2004. Springer, Heidelberg
-
Dodis, Y., Gennaro, R., Håstad, J., Krawczyk, H., Rabin, T.: Randomness Extraction and Key Derivation Using the CBC, Cascade and HMAC Modes. In: Franklin, M. (ed.) CRYPTO 2004. LNCS, vol. 3152, pp. 494-510. Springer, Heidelberg (2004)
-
(2004)
LNCS
, vol.3152
, pp. 494-510
-
-
Dodis, Y.1
Gennaro, R.2
Håstad, J.3
Krawczyk, H.4
Rabin, T.5
-
27
-
-
0022793132
-
How to construct random functions
-
Goldreich, O., Goldwasser, S., Micali, S.: How to construct random functions. J. ACM 33(4), 792-807 (1986)
-
(1986)
J. ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
|