Variations on a theme by Akl and Taylor: Security and tradeoffs
暂无分享,去创建一个
Alfredo De Santis | Anna Lisa Ferrara | Barbara Masucci | Paolo D'Arco | A. D. Santis | A. L. Ferrara | P. D'Arco | B. Masucci | P. D’Arco
[1] Alfredo De Santis,et al. Cryptographic key assignment schemes for any access control policy , 2004, Inf. Process. Lett..
[2] Min-Shiang Hwang,et al. Efficient access control and key management schemes for mobile agents , 2004, Comput. Stand. Interfaces.
[3] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[4] P. Erdös,et al. On the normal number of prime factors of $\phi(n)$ , 1985 .
[5] Oded Goldreich,et al. Foundations of Cryptography: Basic Tools , 2000 .
[6] Tomoyuki Asano. A Revocation Scheme with Minimal Storage at Receivers , 2002, ASIACRYPT.
[7] L. G. H. Cijan. A polynomial algorithm in linear programming , 1979 .
[8] Leonid A. Levin,et al. A hard-core predicate for all one-way functions , 1989, STOC '89.
[9] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[10] Alfredo De Santis,et al. New constructions for provably-secure time-bound hierarchical key assignment schemes , 2007, SACMAT '07.
[11] Alfredo De Santis,et al. Efficient provably-secure hierarchical key assignment schemes , 2007, Theor. Comput. Sci..
[12] Adi Shamir,et al. On the generation of cryptographically strong pseudorandom sequences , 1981, TOCS.
[13] Mikhail J. Atallah,et al. Dynamic and efficient key management for access hierarchies , 2005, CCS '05.
[14] Wen-Guey Tzeng,et al. A secure system for data access based on anonymous authentication and time-dependent hierarchical keys , 2006, ASIACCS '06.
[15] Jason Crampton,et al. Applying hierarchical and role-based access control to XML documents , 2004, SWS '04.
[16] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[17] G. Hardy,et al. An Introduction to the Theory of Numbers , 1938 .
[18] Alfredo De Santis,et al. Efficient Provably-Secure Hierarchical Key Assignment Schemes , 2007, MFCS.
[19] L. Khachiyan. Polynomial algorithms in linear programming , 1980 .
[20] Chi-Sung Laih,et al. Merging: an efficient solution for a time-bound hierarchical key assignment scheme , 2006, IEEE Transactions on Dependable and Secure Computing.
[21] Marina Blanton,et al. Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.
[22] Lein Harn,et al. A cryptographic key generation scheme for multilevel data security , 1990, Comput. Secur..
[23] Kazukuni Kobara,et al. Broadcast encryption with short keys and transmissions , 2003, DRM '03.
[24] Jyh-haw Yeh,et al. Key assignment for enforcing access control policy exceptions in distributed systems , 2003, Inf. Sci..
[25] Selim G. Akl,et al. An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy , 1985, IEEE Transactions on Computers.
[26] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .