-
1
-
-
84897057304
-
-
Advanced Encryption Standard. FIPS PUB 197, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, November (accessed on November 2010)
-
Advanced Encryption Standard. FIPS PUB 197, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, November 2001 < http://csrc.nist.gov/publications/fips/fips197/fips-197.pdf > (accessed on November 2010).
-
(2001)
-
-
-
2
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
S.G. Akl, and P.D. Taylor Cryptographic solution to a problem of access control in a hierarchy ACM Transactions on Computer Systems (TOCS) 1 3 1983 239 248
-
(1983)
ACM Transactions on Computer Systems (TOCS)
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
3
-
-
78049351742
-
Quark: A lightweight hash
-
LNCS
-
J.P. Aumasson, L. Henzen, W. Meier, and M.N. Plasencia, Quark: a lightweight hash, in: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2010), LNCS, vol. 6225, 2010, pp. 1-15.
-
(2010)
Workshop on Cryptographic Hardware and Embedded Systems (CHES 2010)
, vol.6225
, pp. 1-15
-
-
Aumasson, J.P.1
Henzen, L.2
Meier, W.3
Plasencia, M.N.4
-
4
-
-
37149045263
-
PRESENT: An ultra-lightweight block cipher
-
LNCS
-
A. Bogdanov, L.R. Knudsen, G. Leander, C. Paar, A. Poschmann, M.J.B. Robshaw, Y. Seurin, C. Vikkelsoe, PRESENT: an ultra-lightweight block cipher, in: Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007), LNCS, vol. 4727, 2007, pp. 450-466.
-
(2007)
Workshop on Cryptographic Hardware and Embedded Systems (CHES 2007)
, vol.4727
, pp. 450-466
-
-
Bogdanov, A.1
Knudsen, L.R.2
Leander, G.3
Paar, C.4
Poschmann, A.5
Robshaw, M.J.B.6
Seurin, Y.7
Vikkelsoe, C.8
-
5
-
-
34948898634
-
Access control in user hierarchy based on elliptic curve cryptosystem
-
Y.F. Chung, H.H. Lee, F. Lai, and T.S. Chen Access control in user hierarchy based on elliptic curve cryptosystem Information Sciences 178 1 2008 230 243
-
(2008)
Information Sciences
, vol.178
, Issue.1
, pp. 230-243
-
-
Chung, Y.F.1
Lee, H.H.2
Lai, F.3
Chen, T.S.4
-
6
-
-
84860729708
-
A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks
-
A.K. Das A random key establishment scheme for multi-phase deployment in large-scale distributed sensor networks International Journal of Information Security 11 3 2012 189 211
-
(2012)
International Journal of Information Security
, vol.11
, Issue.3
, pp. 189-211
-
-
Das, A.K.1
-
7
-
-
84890560968
-
A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications
-
A.K. Das A secure and effective user authentication and privacy preserving protocol with smart cards for wireless communications Networking Science 2 1-2 2013 12 27
-
(2013)
Networking Science
, vol.2
, Issue.12
, pp. 12-27
-
-
Das, A.K.1
-
8
-
-
84862699099
-
Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem
-
A.K. Das, N.R. Paul, and L. Tripathy Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem Information Sciences 209 2012 80 92
-
(2012)
Information Sciences
, vol.209
, pp. 80-92
-
-
Das, A.K.1
Paul, N.R.2
Tripathy, L.3
-
9
-
-
80054086407
-
A cryptographic key assignment scheme for access control in poset ordered hierarchies with enhanced security
-
D. Giri, and P.D. Srivastava A cryptographic key assignment scheme for access control in poset ordered hierarchies with enhanced security International Journal of Network Security 7 2 2008 223 234
-
(2008)
International Journal of Network Security
, vol.7
, Issue.2
, pp. 223-234
-
-
Giri, D.1
Srivastava, P.D.2
-
10
-
-
0000954459
-
A cryptographic key generation scheme for multilevel data security
-
L. Harn, and H.Y. Lin A cryptographic key generation scheme for multilevel data security Computers & Security 9 6 1990 539 546
-
(1990)
Computers & Security
, vol.9
, Issue.6
, pp. 539-546
-
-
Harn, L.1
Lin, H.Y.2
-
11
-
-
24644472459
-
Improvement on the flexible tree-based key management framework
-
M.-S. Hwang, J.-W. Lo, and C.-H. Liu Improvement on the flexible tree-based key management framework Computers & Security 24 6 2005 500 504
-
(2005)
Computers & Security
, vol.24
, Issue.6
, pp. 500-504
-
-
Hwang, M.-S.1
Lo, J.-W.2
Liu, C.-H.3
-
12
-
-
0038053203
-
Controlling access in large partially ordered hierarchies using cryptographic keys
-
M.-S. Hwang, and W.-P. Yang Controlling access in large partially ordered hierarchies using cryptographic keys Journal of Systems and Software 67 2 2003 99 107
-
(2003)
Journal of Systems and Software
, vol.67
, Issue.2
, pp. 99-107
-
-
Hwang, M.-S.1
Yang, W.-P.2
-
13
-
-
33745856988
-
An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem
-
F.G. Jeng, and C.M. Wang An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem Journal of Systems and Software 79 8 2006 1161 1167
-
(2006)
Journal of Systems and Software
, vol.79
, Issue.8
, pp. 1161-1167
-
-
Jeng, F.G.1
Wang, C.M.2
-
14
-
-
0344089052
-
A new key assignment scheme for enforcing complicated access control policies in hierarchy
-
I.-C. Lin, M.-S. Hwang, and C.-C. Chang A new key assignment scheme for enforcing complicated access control policies in hierarchy Future Generation Computer Systems 19 4 2003 457 462
-
(2003)
Future Generation Computer Systems
, vol.19
, Issue.4
, pp. 457-462
-
-
Lin, I.-C.1
Hwang, M.-S.2
Chang, C.-C.3
-
15
-
-
2342477274
-
Efficient access control and key management schemes for mobile agents
-
I.-C. Lin, H.-H. Ou, and M.-S. Hwang Efficient access control and key management schemes for mobile agents Computer Standards & Interfaces 26 5 2004 423 433
-
(2004)
Computer Standards & Interfaces
, vol.26
, Issue.5
, pp. 423-433
-
-
Lin, I.-C.1
Ou, H.-H.2
Hwang, M.-S.3
-
16
-
-
79751531498
-
Secure key management scheme for dynamic hierarchical access control based on ECC
-
Y.-L. Lin, and C.-L. Hsu Secure key management scheme for dynamic hierarchical access control based on ECC Journal of Systems and Software 84 4 2011 679 685
-
(2011)
Journal of Systems and Software
, vol.84
, Issue.4
, pp. 679-685
-
-
Lin, Y.-L.1
Hsu, C.-L.2
-
17
-
-
78649817331
-
An efficient key assignment scheme for access control in a large leaf class hierarchy
-
J.-W. Lo, M.-S. Hwang, and C.-H. Liu An efficient key assignment scheme for access control in a large leaf class hierarchy Information Sciences 181 2011 917 925
-
(2011)
Information Sciences
, vol.181
, pp. 917-925
-
-
Lo, J.-W.1
Hwang, M.-S.2
Liu, C.-H.3
-
18
-
-
84867860941
-
Secure Communication of Medical Information sing Mobile Agents
-
M. Nikooghadam, and A. Zakerolhosseini Secure Communication of Medical Information sing Mobile Agents Journal of Medical Systems 36 6 2012 3839 3850
-
(2012)
Journal of Medical Systems
, vol.36
, Issue.6
, pp. 3839-3850
-
-
Nikooghadam, M.1
Zakerolhosseini, A.2
-
19
-
-
77956061440
-
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
-
M. Nikooghadam, A. Zakerolhosseini, and M.E. Moghaddam Efficient utilization of elliptic curve cryptosystem for hierarchical access control Journal of Systems and Software 83 10 2010 1917 1929
-
(2010)
Journal of Systems and Software
, vol.83
, Issue.10
, pp. 1917-1929
-
-
Nikooghadam, M.1
Zakerolhosseini, A.2
Moghaddam, M.E.3
-
20
-
-
0023962708
-
Cryptographic implementation of a tree hierarchy for access control
-
R.S. Sandhu Cryptographic implementation of a tree hierarchy for access control Information Processing Letters 27 2 1988 95 98
-
(1988)
Information Processing Letters
, vol.27
, Issue.2
, pp. 95-98
-
-
Sandhu, R.S.1
-
21
-
-
33847696259
-
Access control in networks hierarchy: Implementation of key management protocol
-
N. Sklavos, and O. Koufopavlou Access control in networks hierarchy: implementation of key management protocol International Journal of Network Security 1 2 2005 103 109
-
(2005)
International Journal of Network Security
, vol.1
, Issue.2
, pp. 103-109
-
-
Sklavos, N.1
Koufopavlou, O.2
-
23
-
-
0003629991
-
-
FIPS PUB 180-1 National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April
-
Secure Hash Standard, FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce, April 1995.
-
(1995)
Secure Hash Standard
-
-
-
25
-
-
9544234465
-
Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies
-
S.-Y. Wang, and C.-S. Laih Cryptanalysis of Hwang-Yang scheme for controlling access in large partially ordered hierarchies Journal of Systems and Software 75 2005 189 192
-
(2005)
Journal of Systems and Software
, vol.75
, pp. 189-192
-
-
Wang, S.-Y.1
Laih, C.-S.2
-
26
-
-
84873031582
-
An efficient key-management scheme for hierarchical access control in e-medicine system
-
S. Wu, and K. Chen An efficient key-management scheme for hierarchical access control in e-medicine system Journal of Medical Systems 36 4 2012 2325 2337
-
(2012)
Journal of Medical Systems
, vol.36
, Issue.4
, pp. 2325-2337
-
-
Wu, S.1
Chen, K.2
-
27
-
-
10644259523
-
Access control in a hierarchy using one-way hash functions
-
C. Yang, and C. Li Access control in a hierarchy using one-way hash functions Computers & Security 23 8 2004 659 664
-
(2004)
Computers & Security
, vol.23
, Issue.8
, pp. 659-664
-
-
Yang, C.1
Li, C.2
-
28
-
-
78649878982
-
A key management scheme for hierarchical access control in group communication
-
Q. Zhang, Y. Wang, and J.P. Jue A key management scheme for hierarchical access control in group communication International Journal of Network Security 7 3 2008 323 334
-
(2008)
International Journal of Network Security
, vol.7
, Issue.3
, pp. 323-334
-
-
Zhang, Q.1
Wang, Y.2
Jue, J.P.3
|