Secure Group Communication Based Scheme for Differential Access Control in Dynamic Environments
暂无分享,去创建一个
[1] Matthew J. Moyer,et al. A survey of security issues in multicast communications , 1999, IEEE Network.
[2] Ravi S. Sandhu,et al. Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..
[3] Mohamed G. Gouda,et al. Secure group communications using key graphs , 1998, SIGCOMM '98.
[4] R. Sandhu,et al. Access control: principles and practice , 1994, IEEE Commun. Mag..
[5] Byrav Ramamurthy,et al. Efficient Key Management for Secure Group Communications with Bursty Behavior , 2002, Communications, Internet, and Information Technology.
[6] Ahmet M. Eskicioglu,et al. Simulation Results , 2020, Group Selection in Predator-Prey Communities. (MPB-9), Volume 9.
[7] P. Samarati,et al. Access control: principle and practice , 1994, IEEE Communications Magazine.
[8] Ashok Samal,et al. A dual encryption protocol for scalable secure multicasting , 1999, Proceedings IEEE International Symposium on Computers and Communications (Cat. No.PR00250).
[9] Bernhard Plattner,et al. Efficient security for large and dynamic multicast groups , 1998, Proceedings Seventh IEEE International Workshop on Enabling Technologies: Infrastucture for Collaborative Enterprises (WET ICE '98) (Cat. No.98TB100253).
[10] K. J. Ray Liu,et al. Scalable hierarchical access control in secure group communications , 2004, IEEE INFOCOM 2004.
[11] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[12] Byrav Ramamurthy,et al. Chinese Remainder Theorem Based Hierarchical Access Control for Secure Group Communication , 2001, ICICS.