An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy
IEEE Transactions on Computers
Cryptographic implementation of a tree hierarchy for access control
Information Processing Letters
A cryptographic key generation scheme for multilevel data security
Computers and Security
Cryptographic key assignment scheme for access control in a hierarchy
Information Systems
Cryptanalysis of YCN key assignment scheme in a hierarchy
Information Processing Letters
Cryptographic solution to a problem of access control in a hierarchy
ACM Transactions on Computer Systems (TOCS)
A new dynamic key generation scheme for access control in a hierarchy
Nordic Journal of Computing
A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy
Fundamenta Informaticae
A cryptographic key assignment scheme in a hierarchy for access control
Mathematical and Computer Modelling: An International Journal
Modifying YCN key assignment scheme to resist the attack from Hwang
Information Processing Letters
Dynamic and efficient key management for access hierarchies
Proceedings of the 12th ACM conference on Computer and communications security
Key management for non-tree access hierarchies
Proceedings of the eleventh ACM symposium on Access control models and technologies
Unconditionally secure key assignment schemes
Discrete Applied Mathematics - Special issue: Coding and cryptography
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy
Fundamenta Informaticae
Dual-Level Key Management for secure grid communication in dynamic and hierarchical groups
Future Generation Computer Systems
A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem
Information Processing Letters
A dynamic mechanism for determining relationships in a partially ordered user hierarchy
International Journal of High Performance Computing and Networking
Efficient key management for cryptographically enforced access control
Computer Standards & Interfaces
Dynamic and Efficient Key Management for Access Hierarchies
ACM Transactions on Information and System Security (TISSEC)
Enforcing non-hierarchical access policies by hierarchical key assignment schemes
Information Processing Letters
Unconditionally secure key assignment schemes
Discrete Applied Mathematics - Special issue: Coding and cryptography
Modifying YCN key assignment scheme to resist the attack from Hwang
Information Processing Letters
An efficient key assignment scheme for access control in a large leaf class hierarchy
Information Sciences: an International Journal
A secure broadcasting cryptosystem and its application to grid computing
Future Generation Computer Systems
Enforcement of non-hierarchical access policies
ICCOM'06 Proceedings of the 10th WSEAS international conference on Communications
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy
Fundamenta Informaticae
A secure effective key management scheme for dynamic access control in a large leaf class hierarchy
Information Sciences: an International Journal
Hi-index | 0.00 |