Time-Bound Hierarchical Key Assignment: An Overview
暂无分享,去创建一个
[1] Chi-Sung Laih,et al. Merging: an efficient solution for a time-bound hierarchical key assignment scheme , 2006, IEEE Transactions on Dependable and Secure Computing.
[2] Arjen K. Lenstra,et al. Some Remarks on Lucas-Based Cryptosystems , 1995, CRYPTO.
[3] Jyh-haw Yeh,et al. A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem , 2008, Inf. Process. Lett..
[4] Wen-Guey Tzeng,et al. A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy , 2002, IEEE Trans. Knowl. Data Eng..
[5] Mikhail J. Atallah,et al. Incorporating Temporal Capabilities in Existing Key Management Schemes , 2007, ESORICS.
[6] Mikhail J. Atallah,et al. Efficient techniques for realizing geo-spatial access control , 2007, ASIACCS '07.
[7] Jyh-haw Yeh,et al. An RSA-based time-bound hierarchical key assignment scheme for electronic article subscription , 2005, CIKM '05.
[8] Qiang Tang,et al. Comments on a cryptographic key assignment scheme , 2005, Comput. Stand. Interfaces.
[9] Hung-Yu Chen,et al. Efficient time-bound hierarchical key assignment scheme , 2004 .
[10] Bob Briscoe,et al. MARKS: Zero Side Effect Multicast Key Management Using Arbitrarily Revealed Key Sequences , 1999, Networked Group Communication.
[11] Elisa Bertino,et al. A temporal key management scheme for secure broadcasting of XML documents , 2002, CCS '02.
[12] Daniel E. Geer. Complexity Is the Enemy , 2008, IEEE Secur. Priv..
[13] Xun Yi,et al. Security of Chien's efficient time-bound hierarchical key assignment scheme , 2005, IEEE Transactions on Knowledge and Data Engineering.
[14] Mudhakar Srivatsa,et al. A Scalable Method for Access Control in Location-Based Broadcast Services , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.
[15] Elisa Bertino,et al. An Efficient Time-Bound Hierarchical Key Management Scheme for Secure Broadcasting , 2008, IEEE Transactions on Dependable and Secure Computing.
[16] Hung-Yu Chien,et al. New hierarchical assignment without Public Key cryptography , 2003, Comput. Secur..
[17] Alfredo De Santis,et al. Enforcing the security of a time-bound hierarchical key assignment scheme , 2006, Inf. Sci..
[18] Wen-Guey Tzeng,et al. A secure system for data access based on anonymous authentication and time-dependent hierarchical keys , 2006, ASIACCS '06.
[19] Hung-Min Sun,et al. On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme , 2009, IEEE Transactions on Dependable and Secure Computing.
[20] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[21] Chin-Chen Chang,et al. A new cryptographic key assignment scheme with time-constraint access control in a hierarchy , 2004, Comput. Stand. Interfaces.
[22] Yiming Ye,et al. Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy , 2003, IEEE Trans. Knowl. Data Eng..
[23] Sung-Ming Yen,et al. Fast algorithms for LUC digital signature computation , 1995 .
[24] Alfredo De Santis,et al. New constructions for provably-secure time-bound hierarchical key assignment schemes , 2007, SACMAT '07.