Cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme
暂无分享,去创建一个
[1] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[2] Yuh-Min Tseng,et al. Two integrated schemes of user authentication and access control in a distributed computer network , 1998 .
[3] Shoichiro Nakamura,et al. Applied numerical methods in C , 1992 .
[4] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[5] Chin-Chen Chang,et al. Modified Chang-Hwang-Wu access control scheme , 1993 .
[6] J. Wrench. Table errata: The art of computer programming, Vol. 2: Seminumerical algorithms (Addison-Wesley, Reading, Mass., 1969) by Donald E. Knuth , 1970 .
[7] John B. Kam,et al. A database encryption system with subkeys , 1981, TODS.
[8] Selim G. Akl,et al. An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy , 1985, IEEE Transactions on Computers.