A Robust Time-Bound Hierarchical Key Assignment Scheme
暂无分享,去创建一个
[1] Selim G. Akl,et al. An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy , 1985, IEEE Transactions on Computers.
[2] Lein Harn,et al. A cryptographic key generation scheme for multilevel data security , 1990, Comput. Secur..
[3] Alfredo De Santis,et al. Enforcing the security of a time-bound hierarchical key assignment scheme , 2006, Inf. Sci..
[4] Alfredo De Santis,et al. New constructions for provably-secure time-bound hierarchical key assignment schemes , 2008, Theor. Comput. Sci..
[5] Alfredo De Santis,et al. A note on time-bound hierarchical key assignment schemes , 2013, Inf. Process. Lett..
[6] Yiming Ye,et al. Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy , 2003, IEEE Trans. Knowl. Data Eng..
[7] Wen-Guey Tzeng,et al. A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy , 2002, IEEE Trans. Knowl. Data Eng..
[8] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[9] Hung-Yu Chen,et al. Efficient time-bound hierarchical key assignment scheme , 2004 .
[10] Jyh-haw Yeh,et al. A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem , 2008, Inf. Process. Lett..
[11] Ravi S. Sandhu,et al. Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..