LHSC: An effective dynamic key management scheme for linear hierarchical access control
暂无分享,去创建一个
[1] William Stallings,et al. Cryptography and network security - principles and practice (3. ed.) , 2014 .
[2] Cheng-Chi Lee,et al. A Novel Key Management Scheme for Dynamic Access Control in a Hierarchy , 2011, Int. J. Netw. Secur..
[3] Zhen Wang,et al. Group key management based on information flow policy for multi-privileged groups , 2010, 2010 IEEE International Conference on Information Theory and Information Security.
[4] Byrav Ramamurthy,et al. Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication , 2001, ICICS.
[5] Victor R. L. Shen,et al. A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations , 2002, Comput. Secur..
[6] Vanga Odelu,et al. An Effective and Secure Key-Management Scheme for Hierarchical Access Control in E-Medicine System , 2012, Journal of Medical Systems.
[7] Morteza Nikooghadam,et al. Secure Communication of Medical Information Using Mobile Agents , 2012, Journal of Medical Systems.
[8] Thomas Hardjono,et al. Sibling Intractable Function Families and Their Applications (Extended Abstract) , 1991, ASIACRYPT.
[9] Guangliang Liu,et al. A hierarchical key management scheme in role-based access control , 2010, 2010 International Conference On Computer Design and Applications.
[10] Jennifer Seberry,et al. New Solutions to the Problem of Access Control in a Hierarchy , 1993 .
[11] Kefei Chen,et al. An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System , 2012, Journal of Medical Systems.
[12] Yacine Challal,et al. Key management for content access control in a hierarchy , 2007, Comput. Networks.
[13] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[14] Tang Ming . Wei Lian. Si Tuo Lin Si,et al. Cryptography and Network Security - Principles and Practice , 2015 .
[15] R. S. Sandhu,et al. On some cryptographic solutions for access control in a tree hierarchy , 1987, FJCC.
[16] Ashok Kumar Das,et al. Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem , 2012, Inf. Sci..
[17] Indrajit Ray,et al. A cryptographic solution to implement access control in a hierarchy and more , 2002, SACMAT '02.
[18] Ehud Gudes. The Design of a Cryptography Based Secure File System , 1980, IEEE Transactions on Software Engineering.
[19] Celia Li,et al. Access control in a hierarchy using one-way hash functions , 2004, Comput. Secur..
[20] Marina Blanton,et al. Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.
[21] Yu-Fang Chung,et al. Access control in user hierarchy based on elliptic curve cryptosystem , 2008, Inf. Sci..
[22] Morteza Nikooghadam,et al. Efficient utilization of elliptic curve cryptosystem for hierarchical access control , 2010, J. Syst. Softw..
[23] Yacine Challal,et al. An efficient key management scheme for content access control for linear hierarchies , 2012, Comput. Networks.
[24] Ravi S. Sandhu,et al. Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..
[25] 尚弘 島影. National Institute of Standards and Technologyにおける超伝導研究及び生活 , 2001 .
[26] Chee-Onn Chow,et al. A Novel Secure Key Management Module for Hierarchical Clustering Wireless Sensor Networks , 2011, 2011 Third International Conference on Computational Intelligence, Modelling & Simulation.
[27] Vanga Odelu,et al. A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials , 2012, SNDS.
[28] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[29] Zhong-hua He,et al. Dynamic key management in a user hierarchy , 2008, 2008 2nd International Conference on Anti-counterfeiting, Security and Identification.
[30] Jianmin Zhang,et al. An Efficient Key Management Scheme for Access Control in a User Hierarchy , 2009, 2009 International Conference on Information Technology and Computer Science.