-
1
-
-
84976752387
-
Cryptographic solution to a problem of access control in a hierarchy
-
Akl S. G., Taylor P. D., Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems 1983 1 3 239 248 10.1145/357369.357372
-
(1983)
ACM Transactions on Computer Systems
, vol.1
, Issue.3
, pp. 239-248
-
-
Akl, S.G.1
Taylor, P.D.2
-
2
-
-
0033334588
-
Cryptographic key assignment scheme for dynamic access control in a user hierarchy
-
Kuo F., Shen V., Chen T., Lai F., Cryptographic key assignment scheme for dynamic access control in a user hierarchy. IEE Proceedings-Computers and Digital Techniques 146 5 235 240 10.1049/ip-cdt:19990311
-
IEE Proceedings - Computers and Digital Techniques
, vol.146
, Issue.5
, pp. 235-240
-
-
Kuo, F.1
Shen, V.2
Chen, T.3
Lai, F.4
-
3
-
-
0001692137
-
Cryptographic key assignment scheme for access control in a hierarchy
-
2-s2.0-0001692137
-
Chang C.-C., Hwang R.-J., Wu T.-C., Cryptographic key assignment scheme for access control in a hierarchy. Information Systems 1992 17 3 243 247 10.1016/0306-4379(92)90015-F 2-s2.0-0001692137
-
(1992)
Information Systems
, vol.17
, Issue.3
, pp. 243-247
-
-
Chang, C.-C.1
Hwang, R.-J.2
Wu, T.-C.3
-
4
-
-
5744237343
-
Cryptographic key assignment schemes for any access control policy
-
2-s2.0-5744237343
-
de Santis A., Ferrara A. L., Masucci B., Cryptographic key assignment schemes for any access control policy. Information Processing Letters 2004 92 4 199 205 10.1016/j.ipl.2004.03.019 MR2094859 2-s2.0-5744237343
-
(2004)
Information Processing Letters
, vol.92
, Issue.4
, pp. 199-205
-
-
De Santis, A.1
Ferrara, A.L.2
Masucci, B.3
-
5
-
-
0344089052
-
A new key assignment scheme for enforcing complicated access control policies in hierarchy
-
2-s2.0-0344089052
-
Lin I.-C., Hwang M.-S., Chang C.-C., A new key assignment scheme for enforcing complicated access control policies in hierarchy. Future Generation Computer Systems 2003 19 4 457 462 2-s2.0-0344089052 10.1016/S0167-739X(02)00200-5
-
(2003)
Future Generation Computer Systems
, vol.19
, Issue.4
, pp. 457-462
-
-
Lin, I.-C.1
Hwang, M.-S.2
Chang, C.-C.3
-
6
-
-
13844281059
-
Efficient time-bound hierarchical key assignment scheme
-
2-s2.0-13844281059
-
Chen H.-Y., Efficient time-bound hierarchical key assignment scheme. IEEE Transactions on Knowledge and Data Engineering 2004 16 10 1301 1304 10.1109/TKDE.2004.59 2-s2.0-13844281059
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, Issue.10
, pp. 1301-1304
-
-
Chen, H.-Y.1
-
7
-
-
43649095362
-
An efficient time-bound hierarchical key management scheme for secure broadcasting
-
2-s2.0-43649095362
-
Bertino E., Shang N., Wagstaff S. S. Jr., An efficient time-bound hierarchical key management scheme for secure broadcasting. IEEE Transactions on Dependable and Secure Computing 2008 5 2 65 70 10.1109/TDSC.2007.70241 2-s2.0-43649095362
-
(2008)
IEEE Transactions on Dependable and Secure Computing
, vol.5
, Issue.2
, pp. 65-70
-
-
Bertino, E.1
Shang, N.2
Wagstaff, S.S.3
-
8
-
-
0036187601
-
A time-bound cryptographic key assignment scheme for access control in a hierarchy
-
2-s2.0-0036187601
-
Tzeng W.-G., A time-bound cryptographic key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering 2002 14 1 182 188 10.1109/69.979981 2-s2.0-0036187601
-
(2002)
IEEE Transactions on Knowledge and Data Engineering
, vol.14
, Issue.1
, pp. 182-188
-
-
Tzeng, W.-G.1
-
10
-
-
53249115281
-
New constructions for provably-secure time-bound hierarchical key assignment schemes
-
2-s2.0-53249115281
-
de Santis A., Ferrara A. L., Masucci B., New constructions for provably-secure time-bound hierarchical key assignment schemes. Theoretical Computer Science 2008 407 1-3 213 230 10.1016/j.tcs.2008.05.021 MR2463008 2-s2.0-53249115281
-
(2008)
Theoretical Computer Science
, vol.407
, Issue.1-3
, pp. 213-230
-
-
De Santis, A.1
Ferrara, A.L.2
Masucci, B.3
-
12
-
-
84880649806
-
A scalable transitive human-verifiable authentication protocol for mobile devices
-
2-s2.0-84880649806
-
Chen C.-M., Wang K.-H., Wu T.-Y., Pan J.-S., Sun H.-M., A scalable transitive human-verifiable authentication protocol for mobile devices. IEEE Transactions on Information Forensics and Security 2013 8 8 1318 1330 10.1109/TIFS.2013.2270106 2-s2.0-84880649806
-
(2013)
IEEE Transactions on Information Forensics and Security
, vol.8
, Issue.8
, pp. 1318-1330
-
-
Chen, C.-M.1
Wang, K.-H.2
Wu, T.-Y.3
Pan, J.-S.4
Sun, H.-M.5
-
13
-
-
84896029505
-
A secure and efficient t -out-of- n oblivious transfer based on the generalized aryabhata remainder theorem
-
Liu Y., Chang C.-C., Chang S.-C., A secure and efficient t -out-of- n oblivious transfer based on the generalized aryabhata remainder theorem. Journal of Information Hiding and Multimedia Signal Processing 2014 5 2 223 233
-
(2014)
Journal of Information Hiding and Multimedia Signal Processing
, vol.5
, Issue.2
, pp. 223-233
-
-
Liu, Y.1
Chang, C.-C.2
Chang, S.-C.3
-
14
-
-
84883433659
-
Publicly verifiable multi-secret sharing scheme from bilinear pairings
-
2-s2.0-84883433659
-
Wu T.-Y., Tseng Y.-M., Publicly verifiable multi-secret sharing scheme from bilinear pairings. IET Information Security 2013 7 3 239 246 10.1049/iet-ifs.2012.0105 2-s2.0-84883433659
-
(2013)
IET Information Security
, vol.7
, Issue.3
, pp. 239-246
-
-
Wu, T.-Y.1
Tseng, Y.-M.2
-
15
-
-
84896474654
-
Location-based distributed group key agreement scheme for vehicular AD hoc network
-
759601 2-s2.0-84896474654
-
Wang E. K., Ye Y., Xu X., Location-based distributed group key agreement scheme for vehicular AD hoc network. International Journal of Distributed Sensor Networks 2014 2014 8 759601 10.1155/2014/759601 2-s2.0-84896474654
-
(2014)
International Journal of Distributed Sensor Networks
, vol.2014
, pp. 8
-
-
Wang, E.K.1
Ye, Y.2
Xu, X.3
-
16
-
-
84862787823
-
RCDA: Recoverable concealed data aggregation for data integrity in wireless sensor networks
-
2-s2.0-84862787823
-
Chen C.-M., Lin Y.-H., Lin Y.-C., Sun H.-M., RCDA: recoverable concealed data aggregation for data integrity in wireless sensor networks. IEEE Transactions on Parallel and Distributed Systems 2012 23 4 727 734 10.1109/TPDS.2011.219 2-s2.0-84862787823
-
(2012)
IEEE Transactions on Parallel and Distributed Systems
, vol.23
, Issue.4
, pp. 727-734
-
-
Chen, C.-M.1
Lin, Y.-H.2
Lin, Y.-C.3
Sun, H.-M.4
-
18
-
-
0041347682
-
Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy
-
2-s2.0-0041347682
-
Yi X., Ye Y., Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy. IEEE Transactions on Knowledge and Data Engineering 2003 15 4 1054 1055 10.1109/TKDE.2003.1209023 2-s2.0-0041347682
-
(2003)
IEEE Transactions on Knowledge and Data Engineering
, vol.15
, Issue.4
, pp. 1054-1055
-
-
Yi, X.1
Ye, Y.2
-
19
-
-
33947655924
-
Security of Chien's efficient time-bound hierarchical key assignment scheme
-
2-s2.0-33947655924
-
Yi X., Security of Chien's efficient time-bound hierarchical key assignment scheme. IEEE Transactions on Knowledge and Data Engineering 2005 17 9 1298 1299 10.1109/TKDE.2005.152 2-s2.0-33947655924
-
(2005)
IEEE Transactions on Knowledge and Data Engineering
, vol.17
, Issue.9
, pp. 1298-1299
-
-
Yi, X.1
-
20
-
-
67649239890
-
On the security of an efficient time-bound hierarchical key management scheme
-
2-s2.0-67649239890
-
Sun H.-M., Wang K.-H., Chen C.-M., On the security of an efficient time-bound hierarchical key management scheme. IEEE Transactions on Dependable and Secure Computing 2009 6 2 159 160 10.1109/TDSC.2009.15 2-s2.0-67649239890
-
(2009)
IEEE Transactions on Dependable and Secure Computing
, vol.6
, Issue.2
, pp. 159-160
-
-
Sun, H.-M.1
Wang, K.-H.2
Chen, C.-M.3
-
21
-
-
32844471813
-
Merging: An efficient solution for a time-bound hierarchical key assignment scheme
-
2-s2.0-32844471813
-
Wang S.-Y., Laih C.-S., Merging: an efficient solution for a time-bound hierarchical key assignment scheme. IEEE Transactions on Dependable and Secure Computing 2006 3 1 91 100 10.1109/TDSC.2006.15 2-s2.0-32844471813
-
(2006)
IEEE Transactions on Dependable and Secure Computing
, vol.3
, Issue.1
, pp. 91-100
-
-
Wang, S.-Y.1
Laih, C.-S.2
-
22
-
-
80052701910
-
-
Proceedings of the 16th IEEE Symposium on Computers and Communications (ISCC '11) July 2011 2-s2.0-80052701910
-
de Caro A., Iovino V., jPBC: Java pairing based cryptography. Proceedings of the 16th IEEE Symposium on Computers and Communications (ISCC '11) July 2011 850 855 2-s2.0-80052701910 10.1109/ISCC.2011.5983948
-
JPBC: Java Pairing Based Cryptography
, pp. 850-855
-
-
De Caro, A.1
Iovino, V.2
-
24
-
-
77950347409
-
A view of cloud computing
-
2-s2.0-77950347409
-
Armbrust M., Fox A., Griffith R., Joseph A. D., Katz R., Konwinski A., Lee G., Patterson D., Rabkin A., Stoica I., Zaharia M., A view of cloud computing. Communications of the ACM 2010 53 4 50 58 10.1145/1721654.1721672 2-s2.0-77950347409
-
(2010)
Communications of the ACM
, vol.53
, Issue.4
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
25
-
-
78649322624
-
A survey on security issues in service delivery models of cloud computing
-
2-s2.0-78649322624 10.1016/j.jnca.2010.07.006
-
Subashini S., Kavitha V., A survey on security issues in service delivery models of cloud computing. Journal of Network and Computer Applications 2011 34 1 1 11 2-s2.0-78649322624 10.1016/j.jnca.2010.07.006
-
(2011)
Journal of Network and Computer Applications
, vol.34
, Issue.1
, pp. 1-11
-
-
Subashini, S.1
Kavitha, V.2
-
27
-
-
80051870839
-
-
Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS '11) June 2011 Minneapolis, Minn, USA 10.1109/ICDCS.2011.50 2-s2.0-80051870839
-
Wu Y., Wu C., Li B., Qiu X., Lau F. C. M., CloudMedia: when cloud on demand meets video on demand. Proceedings of the 31st International Conference on Distributed Computing Systems (ICDCS '11) June 2011 Minneapolis, Minn, USA 268 277 10.1109/ICDCS.2011.50 2-s2.0-80051870839
-
CloudMedia: When Cloud on Demand Meets Video on Demand
, pp. 268-277
-
-
Wu, Y.1
Wu, C.2
Li, B.3
Qiu, X.4
Lau, F.C.M.5
|