A new access control scheme with high data security
暂无分享,去创建一个
[1] William L. Maxwell,et al. On the implementation of security measures in information systems , 1972, CACM.
[2] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[3] E. Brickell,et al. Cryptanalysis: a survey of recent results , 1988, Proc. IEEE.
[4] Martin E. Hellman,et al. Hiding information and signatures in trapdoor knapsacks , 1978, IEEE Trans. Inf. Theory.
[5] Chin-Chen Chang,et al. On the design of a Key-Lock-Pair mechanism in information protection systems , 1986, BIT.
[6] Jinn-ke Jan. A single-key access control scheme in information protection systems , 1990, Inf. Sci..
[7] M. Hellman. The Mathematics of Public-Key Cryptography , 1979 .
[8] Adi Shamir,et al. A polynomial time algorithm for breaking the basic Merkle-Hellman cryptosystem , 1982, 23rd Annual Symposium on Foundations of Computer Science (sfcs 1982).
[9] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[10] Tai-Yang Hwang,et al. Access Control with Single-Key-Lock , 1984, IEEE Transactions on Software Engineering.
[11] Peter J. Denning,et al. Protection: principles and practice , 1972, AFIPS '72 (Spring).