An asymmetric cryptographuic key assignment scheme for access control in totally-ordered hierarchies
暂无分享,去创建一个
[1] Chin-Chen Chang,et al. Modified Chang-Hwang-Wu access control scheme , 1993 .
[2] Chin-Chen Chang,et al. Crypographic key assignment scheme for access control in a hierarchy , 1992, Inf. Syst..
[3] Lein Harn,et al. A cryptographic key generation scheme for multilevel data security , 1990, Comput. Secur..
[4] Selim G. Akl,et al. Cryptographic Solution to a Multilevel Security Problem , 1982, CRYPTO.
[5] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[6] Selim G. Akl,et al. An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy , 1985, IEEE Transactions on Computers.
[7] Min-Shiang Hwang,et al. An Improvement of Novel Cryptographic Key Assignment Scheme for Dynamic Access Control in a Hierarchy , 1999 .
[8] Whitfield Diffie. The first ten years of public-key cryptography , 1988 .
[9] Min-Shiang Hwang. An improvement of a dynamic cryptographic key assignment scheme in a tree hierarchy , 1999 .
[10] Ravi S. Sandhu,et al. Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..
[11] Hwang Min-Shiang,et al. A cryptographic key assignment scheme in a hierarchy for access control , 1997 .
[12] J. H. Moore. Protocol failures in cryptosystems , 1988, Proc. IEEE.
[13] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[14] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[15] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[16] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.