New Solutions to the Problem of Access Control in a Hierarchy
暂无分享,去创建一个
[1] Ravi S. Sandhu,et al. Cryptographic Implementation of a Tree Hierarchy for Access Control , 1988, Inf. Process. Lett..
[2] Larry Carter,et al. Universal Classes of Hash Functions , 1979, J. Comput. Syst. Sci..
[3] Selim G. Akl,et al. Cryptographic solution to a problem of access control in a hierarchy , 1983, TOCS.
[4] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[5] John Rompel,et al. One-way functions are necessary and sufficient for secure signatures , 1990, STOC '90.
[6] Larry Carter,et al. New Hash Functions and Their Use in Authentication and Set Equality , 1981, J. Comput. Syst. Sci..
[7] Selim G. Akl,et al. Cryptographic Solution to a Multilevel Security Problem , 1982, CRYPTO.
[8] Moni Naor,et al. Universal one-way hash functions and their cryptographic applications , 1989, STOC '89.
[9] Stafford E. Tavares,et al. Flexible Access Control with Master Keys , 1989, CRYPTO.
[10] Johan Håstad,et al. Pseudo-random generators under uniform assumptions , 1990, STOC '90.
[11] Leonid A. Levin,et al. Pseudo-random generation from one-way functions , 1989, STOC '89.
[12] T. Hardjono. Sibling Intractable Function Families and Their Applications 1 , 1992 .
[13] Kenji Koyama,et al. Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme , 1991, EUROCRYPT.
[14] Thomas Hardjono,et al. Sibling Intractable Function Families and Their Applications (Extended Abstract) , 1991, ASIACRYPT.
[15] Silvio Micali,et al. How to construct random functions , 1986, JACM.
[16] Lein Harn,et al. A cryptographic key generation scheme for multilevel data security , 1990, Comput. Secur..