Cryptographic solution to a problem of access control in a hierarchy
暂无分享,去创建一个
[1] Gustavus J. Simmons,et al. Symmetric and Asymmetric Encryption , 1979, CSUR.
[2] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[3] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[4] Ivan Matveevich Vinogradov,et al. An introduction to the theory of numbers , 1955 .
[5] Selim G. Akl,et al. An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy , 1985, IEEE Transactions on Computers.
[6] Dorothy E. Denning,et al. A lattice model of secure information flow , 1976, CACM.
[7] Derrick Grover,et al. Cryptography: A Primer , 1982 .
[8] M. Rabin. DIGITALIZED SIGNATURES AND PUBLIC-KEY FUNCTIONS AS INTRACTABLE AS FACTORIZATION , 1979 .
[9] Martin E. Hellman,et al. An improved algorithm for computing logarithms over GF(p) and its cryptographic significance (Corresp.) , 1978, IEEE Trans. Inf. Theory.
[10] Alan G. Konheim. Cryptography, a primer , 1981 .
[11] Stephen C. Pohlig,et al. An Improved Algorithm for Computing Logarithms over GF(p) and Its Cryptographic Significance , 2022, IEEE Trans. Inf. Theory.
[12] Donald Ervin Knuth,et al. The Art of Computer Programming , 1968 .
[13] David A. Bell,et al. Secure computer systems: mathematical foundations and model , 1973 .
[14] E. T.. An Introduction to the Theory of Numbers , 1946, Nature.
[15] E. Wright,et al. An Introduction to the Theory of Numbers , 1939 .
[16] Stephen M. Matyas,et al. Cryptography: A New Dimension in Computer Data Security--A Guide for the Design and Implementation of Secure Systems , 1982 .
[17] Ehud Gudes. The Design of a Cryptography Based Secure File System , 1980, IEEE Transactions on Software Engineering.