Hash Vine: A New Hash Structure for Scalable Generation of Hierarchical Hash Codes
暂无分享,去创建一个
[1] Ashutosh Saxena,et al. Hierarchical key management scheme using polynomial interpolation , 2005, OPSR.
[2] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[3] Celia Li,et al. Access control in a hierarchy using one-way hash functions , 2004, Comput. Secur..
[4] Marina Blanton,et al. Dynamic and Efficient Key Management for Access Hierarchies , 2009, TSEC.
[5] Pingzhi Fan,et al. Access key distribution scheme for level-based hierarchy , 2003, Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies.
[6] T. Hardjono. Sibling Intractable Function Families and Their Applications 1 , 1992 .
[7] Alfredo De Santis,et al. Cryptographic key assignment schemes for any access control policy , 2004, Inf. Process. Lett..
[8] Masaaki Fujiyoshi,et al. Efficient collusion attack-free access control for multidimensionally hierarchical scalability content , 2009, 2009 IEEE International Symposium on Circuits and Systems.
[9] Chang Wen Chen,et al. A collusion resilient key management scheme for multi-dimensional scalable media access control , 2011, 2011 18th IEEE International Conference on Image Processing.
[10] Jin Li,et al. Hierarchical and Shared Access Control , 2016, IEEE Transactions on Information Forensics and Security.
[11] Usman Tariq,et al. Polynomial-based key management for secure intra-group and inter-group communication , 2013, Comput. Math. Appl..
[12] K.R. Ramkumar,et al. Key management using Chebyshev polynomials for mobile ad hoc networks , 2017, China Communications.
[13] Alfredo De Santis,et al. Efficient Provably-Secure Hierarchical Key Assignment Schemes , 2007, MFCS.
[14] Dorothy E. Denning,et al. Cryptography and Data Security , 1982 .
[15] G. Amdhal,et al. Validity of the single processor approach to achieving large scale computing capabilities , 1967, AFIPS '67 (Spring).
[16] Shoko Imaizumi. A collusion-free key assignment scheme for hierarchical access control using recursive hash chains , 2013, 2013 IEEE International Symposium on Circuits and Systems (ISCAS2013).
[17] Selim G. Akl,et al. An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy , 1985, IEEE Transactions on Computers.
[18] Ravi S. Sandhu,et al. Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..
[19] Lein Harn,et al. A cryptographic key generation scheme for multilevel data security , 1990, Comput. Secur..
[20] Wei-Pang Yang,et al. Controlling access in large partially ordered hierarchies using cryptographic keys , 2003, J. Syst. Softw..
[21] Stafford E. Tavares,et al. Flexible Access Control with Master Keys , 1989, CRYPTO.
[22] Jason Crampton,et al. Cryptographically-enforced hierarchical access control with multiple keys , 2009, J. Log. Algebraic Methods Program..
[23] Marc Joye,et al. One-Way Cross-Trees and Their Applications , 2002, Public Key Cryptography.
[24] Alfredo De Santis,et al. New constructions for provably-secure time-bound hierarchical key assignment schemes , 2008, Theor. Comput. Sci..
[25] Jennifer Seberry,et al. New Solutions to the Problem of Access Control in a Hierarchy , 1993 .
[26] Indrajit Ray,et al. A cryptographic solution to implement access control in a hierarchy and more , 2002, SACMAT '02.