An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy
IEEE Transactions on Computers
A key-exchange system based on imaginary quadratic fields
Journal of Cryptology
A course in computational algebraic number theory
A course in computational algebraic number theory
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
A method for obtaining digital signatures and public-key cryptosystems
Communications of the ACM
Introduction to cryptography: principles and applications
Introduction to cryptography: principles and applications
Cryptography: Theory and Practice,Second Edition
Cryptography: Theory and Practice,Second Edition
Handbook of Applied Cryptography
Handbook of Applied Cryptography
New Key Generation Algorithms for Multilevel Security
SP '83 Proceedings of the 1983 IEEE Symposium on Security and Privacy
Public-key cryptosystems based on class semigroups of imaginary quadratic non-maximal orders
ACISP'03 Proceedings of the 8th Australasian conference on Information security and privacy
EuroPKI 2006 Proceedings of the Third European conference on Public Key Infrastructure: theory and Practice
Hi-index | 0.00 |
In this paper, we review briefly Akl and Taylor’s cryptographic solution of multilevel security problem. We propose new key management systems for multilevel security using various one-way functions.