A Low-Cost Key Derivation Scheme for Hierarchy-Based Access
暂无分享,去创建一个
[1] Jianhua Li,et al. A Group Key Management Scheme with Revocation and Loss-tolerance Capability for Wireless Sensor Networks , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[2] Ravi S. Sandhu,et al. Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..
[3] Ravi S. Sandhu,et al. The Reflected Tree Hierarchy for Protection and Sharing , 1989, Inf. Process. Lett..
[4] Byrav Ramamurthy,et al. Hierarchy-based access control in distributed environments , 2001, ICC 2001. IEEE International Conference on Communications. Conference Record (Cat. No.01CH37240).
[5] Tomoyuki Asano. A Revocation Scheme with Minimal Storage at Receivers , 2002, ASIACRYPT.
[6] Marc Joye,et al. One-Way Cross-Trees and Their Applications , 2002, Public Key Cryptography.
[7] Bob Briscoe,et al. Nark: receiver-based multicast non-repudiation and key management , 1999, EC '99.
[8] Robert H. Deng,et al. Progressive protection of JPEG2000 codestreams , 2004, 2004 International Conference on Image Processing, 2004. ICIP '04..
[9] Ari Juels,et al. Minimalist Cryptography for Low-Cost RFID Tags , 2004, SCN.
[10] Indrajit Ray,et al. A cryptographic solution to implement access control in a hierarchy and more , 2002, SACMAT '02.
[11] Vipul Goyal,et al. How To Re-initialize a Hash Chain , 2004, IACR Cryptol. ePrint Arch..
[12] Chu-Hsing Lin,et al. Dynamic key management schemes for access control in a hierarchy , 1997, Comput. Commun..
[13] Chu-Hsing Lin,et al. Hierarchical key assignment without public-key cryptography , 2001, Comput. Secur..
[14] Toru Fujiwara,et al. A Time-Limited Key Management Scheme Based on a One-Way Permutation Tree , 2005 .