An Efficient Solution for Time-Bound Hierarchical Key Assignment Scheme
暂无分享,去创建一个
[1] Hung-Yu Chen,et al. Efficient time-bound hierarchical key assignment scheme , 2004 .
[2] Tianpu Jiang,et al. Key distribution based on hierarchical access control for conditional access system in DTV broadcast , 2004, IEEE Transactions on Consumer Electronics.
[3] Alfredo De Santis,et al. New constructions for provably-secure time-bound hierarchical key assignment schemes , 2007, SACMAT '07.
[4] Chi-Sung Laih,et al. Merging: an efficient solution for a time-bound hierarchical key assignment scheme , 2006, IEEE Transactions on Dependable and Secure Computing.
[5] Wen-Guey Tzeng,et al. A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy , 2002, IEEE Trans. Knowl. Data Eng..
[6] Yuh-Min Tseng,et al. Towards scalable key management for secure multicast communication , 2012, Inf. Technol. Control..
[7] Xun Yi,et al. Security of Chien's efficient time-bound hierarchical key assignment scheme , 2005, IEEE Transactions on Knowledge and Data Engineering.
[8] Marina Blanton,et al. Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.
[9] Yiming Ye,et al. Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy , 2003, IEEE Trans. Knowl. Data Eng..
[10] Matthew K. Franklin,et al. Identity-Based Encryption from the Weil Pairing , 2001, CRYPTO.
[11] Zhaohui Cheng,et al. Implementing Pairing-Based Cryptosystems in USB Tokens , 2014, IACR Cryptol. ePrint Arch..
[12] Jyh-haw Yeh,et al. A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem , 2008, Inf. Process. Lett..
[13] Mikhail J. Atallah,et al. Dynamic and efficient key management for access hierarchies , 2005, CCS '05.
[14] Hung-Min Sun,et al. An Efficient Solution for Hierarchical Access Control Problem in Cloud Environment , 2014 .
[15] Hung-Min Sun,et al. An Efficient Time-Bound Hierarchical Key Management Scheme without Tamper-Resistant Devices , 2012, 2012 International Conference on Computing, Measurement, Control and Sensor Network.
[16] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[17] Yuh-Min Tseng,et al. An ID-Based Mutual Authentication and Key Exchange Protocol for Low-Power Mobile Devices , 2010, Comput. J..
[18] Wen-Guey Tzeng,et al. CloudHKA: A Cryptographic Approach for Hierarchical Access Control in Cloud Computing , 2013, ACNS.
[19] Jeng-Shyang Pan,et al. Towards Time-Bound Hierarchical Key Management in Cloud Computing , 2014, ECC.