|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 68 occurrences of 39 keywords
|
|
|
Results
Found 130 publication records. Showing 130 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
53 | Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
Provably-secure time-bound hierarchical key assignment schemes. |
CCS |
2006 |
DBLP DOI BibTeX RDF |
access control, provable security, key assignment |
48 | Wen-Guey Tzeng |
A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy. |
IEEE Trans. Knowl. Data Eng. |
2002 |
DBLP DOI BibTeX RDF |
cryptographic key assignment, secure broadcasting, cryptographic key backup, access control |
46 | Jyh-haw Yeh |
An RSA-based time-bound hierarchical key assignment scheme for electronic article subscription. |
CIKM |
2005 |
DBLP DOI BibTeX RDF |
access control, key assignment |
43 | Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
New constructions for provably-secure time-bound hierarchical key assignment schemes. |
SACMAT |
2007 |
DBLP DOI BibTeX RDF |
access control, provable security, key assignment |
43 | Tatsuyuki Matsushita, Hideki Imai |
Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size. |
ICICS |
2006 |
DBLP DOI BibTeX RDF |
Hierarchical key assignment, black-box tracing, reduced ciphertext size |
41 | André Adelsbach, Jörg Schwenk |
Key-assignment strategies for CPPM. |
MM&Sec |
2004 |
DBLP DOI BibTeX RDF |
CPPM, device revocation, key-management, content protection, key-assignment |
38 | Shyh-Yih Wang, Chi-Sung Laih |
Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme. |
IEEE Trans. Dependable Secur. Comput. |
2006 |
DBLP DOI BibTeX RDF |
Access control, cryptography, key management |
38 | Yi-Hua E. Yang, Joseph D. Touch |
Protocol Family for Optimal and Deterministic Symmetric Key Assignment. |
ICN |
2008 |
DBLP DOI BibTeX RDF |
Collusion resilience, Maximum-Distance Separable code, symmetric key assignment, symmetric key pre-distribution, Reed-Solomon code |
36 | Jason Crampton, Keith M. Martin, Peter R. Wild |
On Key Assignment for Hierarchical Access Control. |
CSFW |
2006 |
DBLP DOI BibTeX RDF |
|
36 | Xun Yi |
Security of Chien's Efficient Time-Bound Hierarchical Key Assignment Scheme. |
IEEE Trans. Knowl. Data Eng. |
2005 |
DBLP DOI BibTeX RDF |
hierarchical key assignment, Cryptography |
35 | Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung |
Modified Cryptographic Key Assignment Scheme for Overcoming the Incorrectness of the CHW Scheme. |
EEE |
2004 |
DBLP DOI BibTeX RDF |
Cryptographic key assignment scheme, predecessor, successor, user hierarchy, partial order set |
35 | Xun Yi, Yiming Ye |
Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy. |
IEEE Trans. Knowl. Data Eng. |
2003 |
DBLP DOI BibTeX RDF |
Access control, RSA, collusion attack, key assignment |
29 | Ramon Novales, Neeraj Mittal, Kamil Saraç |
SKAIT: A Parameterized Key Assignment Scheme for Wireless Networks. |
ISPDC |
2010 |
DBLP DOI BibTeX RDF |
confidential communication, symmetric key assignment, key pre-distribution, collusion resistance |
29 | Hsing-Chung Chen, Shiuh-Jeng Wang, Jyh-Horng Wen, Chung-Wei Chen |
Flexible Key Assignment for a Time-Token Constraint in a Hierarchy. |
MUE |
2008 |
DBLP DOI BibTeX RDF |
proactive key management, time-token, access control, key assignment |
27 | Hung-Yu Chien |
Efficient Time-Bound Hierarchical Key Assignment Scheme. |
IEEE Trans. Knowl. Data Eng. |
2004 |
DBLP DOI BibTeX RDF |
|
25 | Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy. |
WCC |
2005 |
DBLP DOI BibTeX RDF |
|
24 | Chin-Chen Chang 0001, Iuon-Chang Lin, Hui-Min Tsai, Hsiao-Hsi Wang |
A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies. |
AINA (2) |
2004 |
DBLP DOI BibTeX RDF |
|
24 | Anna Lisa Ferrara, Barbara Masucci |
An Information-Theoretic Approach to the Access Control Problem. |
ICTCS |
2003 |
DBLP DOI BibTeX RDF |
|
24 | Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
Efficient Provably-Secure Hierarchical Key Assignment Schemes. |
MFCS |
2007 |
DBLP DOI BibTeX RDF |
|
24 | Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci |
Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes. |
IEEE Trans. Dependable Secur. Comput. |
2016 |
DBLP DOI BibTeX RDF |
|
24 | Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci |
Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes. |
IACR Cryptol. ePrint Arch. |
2014 |
DBLP BibTeX RDF |
|
23 | Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei |
A distributed key assignment protocol for secure multicast based on proxy cryptography. |
AsiaCCS |
2006 |
DBLP DOI BibTeX RDF |
ElGamal cryptosystem, key composition, proxy cryptography, secure multicast |
22 | Feng Li 0001, Jie Wu 0001 |
A probabilistic voting-based filtering scheme in wireless sensor networks. |
IWCMC |
2006 |
DBLP DOI BibTeX RDF |
probabilistic key assignment, voting method, wireless sensor networks, wireless communications, node compromise |
21 | Wai-Meng Chew, Chi-Hung Chi, Tieyan Li |
Efficient Key Assignment Scheme for Mobile Agent Systems. |
ICTAI |
2003 |
DBLP DOI BibTeX RDF |
|
20 | Qingyu Xu, Mingxing He, Lein Harn |
An Improved Time-Bound Hierarchical Key Assignment Scheme. |
APSCC |
2008 |
DBLP DOI BibTeX RDF |
|
20 | Anne V. D. M. Kayem, Patrick Martin 0001, Selim G. Akl |
Heuristics for Improving Cryptographic Key Assignment in a Hierarchy. |
AINA Workshops (1) |
2007 |
DBLP DOI BibTeX RDF |
|
19 | Paolo D'Arco, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants. |
MFCS |
2009 |
DBLP DOI BibTeX RDF |
|
18 | Purva Sharma, Vimal Bhatia, Shashi Prakash |
Routing and Scheduling of Key Assignment in Optical Networks secured by Quantum Key Distribution. |
ANTS |
2021 |
DBLP DOI BibTeX RDF |
|
18 | Yuan Cao, Yongli Zhao, Jun Li 0059, Rui Lin 0001, Jie Zhang 0006, Jiajia Chen 0001 |
Reinforcement Learning Based Multi-Tenant Secret-Key Assignment for Quantum Key Distribution Networks. |
OFC |
2019 |
DBLP BibTeX RDF |
|
18 | Eduarda Simões Veloso Freire |
Non-interactive key exchange and key assignment schemes. |
|
2014 |
RDF |
|
18 | Jyh-haw Yeh |
A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem. |
Inf. Process. Lett. |
2008 |
DBLP DOI BibTeX RDF |
|
18 | Chu-Hsing Lin |
Hierarchical key assignment without public-key cryptography. |
Comput. Secur. |
2001 |
DBLP DOI BibTeX RDF |
|
18 | Mohammed A. Moharrum, Mohamed Eltoweissy |
A study of static versus dynamic keying schemes in sensor networks. |
PE-WASUN |
2005 |
DBLP DOI BibTeX RDF |
dynamic keying, exclusion-basis systems, sensor networks, key management, secure communications |
17 | Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Eltoweissy |
Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks. |
IEEE Trans. Parallel Distributed Syst. |
2006 |
DBLP DOI BibTeX RDF |
location-aware protocols, exclusion basis systems, Wireless sensor networks, combinatorial optimization, key management, secure group communications, collusion attacks, energy efficient design |
17 | Hao Yuan, Mikhail J. Atallah |
Efficient and secure distribution of massive geo-spatial data. |
GIS |
2009 |
DBLP DOI BibTeX RDF |
geo-spatial access control, key assignment and derivation, key management |
17 | Jieh-Shan Yeh, Shang-Ru Yang, Chin-Chen Chang 0001, Tzungher Chen |
Assigning Keys in a Hierarchy. |
IIH-MSP |
2008 |
DBLP DOI BibTeX RDF |
access control, key management, broadcast encryption, group key, key assignment |
17 | Mikhail J. Atallah, Marina Blanton, Keith B. Frikken |
Efficient techniques for realizing geo-spatial access control. |
AsiaCCS |
2007 |
DBLP DOI BibTeX RDF |
geo-spatial access control, key assignment and derivation, key management |
17 | Tzer-Shyong Chen, Yu-Fang Chung, Chang-Sin Tian |
A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy. |
COMPSAC |
2004 |
DBLP DOI BibTeX RDF |
Cryptographic Key Assignment and User Hierarchy, Access Control, One-Way Hash Function |
15 | Jian Wang 0038, Lein Harn, Hideki Imai |
Key Management for Multicast Fingerprinting. |
ICISS |
2005 |
DBLP DOI BibTeX RDF |
|
13 | Hua Sun 0001 |
Compound Secure Groupcast: Key Assignment for Selected Broadcasting. |
IEEE J. Sel. Areas Inf. Theory |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Xinyi He, Lin Li, Dahai Han, Yongli Zhao, Avishek Nag, Wei Wang 0116, Hua Wang, Yuan Cao, Jie Zhang 0006 |
Routing and secret key assignment for secure multicast services in quantum satellite networks. |
JOCN |
2022 |
DBLP DOI BibTeX RDF |
|
13 | Baris Celiktas |
A hierarchical key assignment scheme for access control in cloud computing (Bulut bilişimde erişim kontrolü için hiyerarşik anahtar atama şeması) |
|
2022 |
RDF |
|
13 | Hua Sun 0001 |
Compound Secure Groupcast: Key Assignment for Selected Broadcasting. |
ISIT |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Anna Lisa Ferrara, Federica Paci, Chiara Ricciardi |
Verifiable Hierarchical Key Assignment Schemes. |
DBSec |
2021 |
DBLP DOI BibTeX RDF |
|
13 | Hua Sun 0001 |
Compound Secure Groupcast: Key Assignment for Selected Broadcasting. |
CoRR |
2020 |
DBLP BibTeX RDF |
|
13 | Anna Lisa Ferrara, Chiara Ricciardi |
Verifiable Hierarchical Key Assignment Schemes. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
13 | Jeroen Pijnenburg, Bertram Poettering |
Key Assignment Schemes with Authenticated Encryption, revisited. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
13 | Jeroen Pijnenburg, Bertram Poettering |
Key Assignment Schemes with Authenticated Encryption, revisited. |
IACR Trans. Symmetric Cryptol. |
2020 |
DBLP DOI BibTeX RDF |
|
13 | Suyash Kandele, Souradyuti Paul |
Key Assignment Scheme with Authenticated Encryption. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
13 | Suyash Kandele, Souradyuti Paul |
Key Assignment Scheme with Authenticated Encryption. |
IACR Trans. Symmetric Cryptol. |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Ping-Kun Hsu, Mu-Ting Lin, Iuon-Chang Lin |
Flexible Hierarchical Key Assignment Scheme with Time-Based Assured Deletion for Cloud Storage. |
ICS |
2018 |
DBLP DOI BibTeX RDF |
|
13 | Naomi Farley |
On key assignment schemes and cryptographic enforcement mechanisms for information flow policies. |
|
2018 |
RDF |
|
13 | Yi-Ruei Chen, Wen-Guey Tzeng |
Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security. |
ACNS |
2017 |
DBLP DOI BibTeX RDF |
|
13 | Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri 0002, Aniello Castiglione |
On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures. |
ACISP (2) |
2016 |
DBLP DOI BibTeX RDF |
|
13 | Massimo Cafaro, Roberto Civino, Barbara Masucci |
On the Equivalence of Two Security Notions for Hierarchical Key Assignment Schemes in the Unconditional Setting. |
IEEE Trans. Dependable Secur. Comput. |
2015 |
DBLP DOI BibTeX RDF |
|
13 | Jeng-Shyang Pan 0001, Tsu-Yang Wu, Chien-Ming Chen 0001, Eric Ke Wang |
Security Analysis of a Time-Bound Hierarchical Key Assignment Scheme. |
IIH-MSP |
2015 |
DBLP DOI BibTeX RDF |
|
13 | Jeng-Shyang Pan 0001, Tsu-Yang Wu, Chien-Ming Chen 0001, Eric Ke Wang |
An Efficient Solution for Time-Bound Hierarchical Key Assignment Scheme. |
ICGEC (2) |
2015 |
DBLP DOI BibTeX RDF |
|
13 | Ramon Novales, Neeraj Mittal, Kamil Saraç |
SKAIT: A parameterized key assignment scheme for confidential communication in resource constrained ad hoc wireless networks. |
Ad Hoc Networks |
2014 |
DBLP DOI BibTeX RDF |
|
13 | Khair Eddin Sabri |
Algebraic Analysis of Object-Based Key Assignment Schemes. |
J. Softw. |
2014 |
DBLP DOI BibTeX RDF |
|
13 | Massimo Cafaro, Roberto Civino, Barbara Masucci |
On the Unconditional Security of Hierarchical Key Assignment Schemes. |
CoRR |
2014 |
DBLP BibTeX RDF |
|
13 | Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci |
Hierarchical and Shared Key Assignment. |
NBiS |
2014 |
DBLP DOI BibTeX RDF |
|
13 | Tsu-Yang Wu, Chengxiang Zhou, Chien-Ming Chen 0001, Eric Ke Wang, Jeng-Shyang Pan 0001 |
Towards Time-Bound Hierarchical Key Assignment for Secure Data Access Control. |
MISNC |
2014 |
DBLP DOI BibTeX RDF |
|
13 | Cheng-Chi Lee, Yan-Ming Lai, Chin-Sung Hsiao |
Cryptanalysis of a simple key assignment for access control based on polynomial. |
J. Inf. Secur. Appl. |
2013 |
DBLP DOI BibTeX RDF |
|
13 | Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
A note on time-bound hierarchical key assignment schemes. |
Inf. Process. Lett. |
2013 |
DBLP DOI BibTeX RDF |
|
13 | James Alderman, Jason Crampton |
On the Use of Key Assignment Schemes in Authentication Protocols |
CoRR |
2013 |
DBLP BibTeX RDF |
|
13 | Naveen Kumar 0011, Anish Mathuria, Manik Lal Das |
Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme - (Short Paper). |
ICISS |
2013 |
DBLP DOI BibTeX RDF |
|
13 | James Alderman, Jason Crampton |
On the Use of Key Assignment Schemes in Authentication Protocols. |
NSS |
2013 |
DBLP DOI BibTeX RDF |
|
13 | Shoko Imaizumi |
A collusion-free key assignment scheme for hierarchical access control using recursive hash chains. |
ISCAS |
2013 |
DBLP DOI BibTeX RDF |
|
13 | Eduarda S. V. Freire 0001, Kenneth G. Paterson, Bertram Poettering |
Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. |
CT-RSA |
2013 |
DBLP DOI BibTeX RDF |
|
13 | Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. |
J. Cryptol. |
2012 |
DBLP DOI BibTeX RDF |
|
13 | Eduarda S. V. Freire 0001, Kenneth G. Paterson, Bertram Poettering |
Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. |
IACR Cryptol. ePrint Arch. |
2012 |
DBLP BibTeX RDF |
|
13 | Khair Eddin Sabri, Ridha Khédri |
A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes. |
FPS |
2012 |
DBLP DOI BibTeX RDF |
|
13 | Shoko Imaizumi, Naokazu Aoki, Hiroyuki Kobayashi, Hitoshi Kiya |
Hierarchical Key Assignment Scheme for Multimedia Access Control with Modified Hash Chain. |
IIH-MSP |
2012 |
DBLP DOI BibTeX RDF |
|
13 | Jung-Wen Lo, Min-Shiang Hwang, Chia-Hsin Liu |
An efficient key assignment scheme for access control in a large leaf class hierarchy. |
Inf. Sci. |
2011 |
DBLP DOI BibTeX RDF |
|
13 | Ramon Novales, Neeraj Mittal |
Parameterized key assignment for confidential communication in wireless networks. |
Ad Hoc Networks |
2011 |
DBLP DOI BibTeX RDF |
|
13 | Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
Efficient provably-secure hierarchical key assignment schemes. |
Theor. Comput. Sci. |
2011 |
DBLP DOI BibTeX RDF |
|
13 | Eduarda S. V. Freire 0001, Kenneth G. Paterson |
Provably Secure Key Assignment Schemes from Factoring. |
ACISP |
2011 |
DBLP DOI BibTeX RDF |
|
13 | Wen Tao Zhu, Robert H. Deng, Jianying Zhou 0001, Feng Bao 0001 |
Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks. |
ICICS |
2011 |
DBLP DOI BibTeX RDF |
|
13 | Wen Tao Zhu, Robert H. Deng, Jianying Zhou 0001, Feng Bao 0001 |
Time-Bound Hierarchical Key Assignment: An Overview. |
IEICE Trans. Inf. Syst. |
2010 |
DBLP DOI BibTeX RDF |
|
13 | Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux |
The impact of key assignment on VANET privacy. |
Secur. Commun. Networks |
2010 |
DBLP DOI BibTeX RDF |
|
13 | Hung-Yu Chien, Ying-Lun Chen, Chien-Feng Lo, Yuh-Ming Huang |
A Novel E-Newspapers Publication System Using Provably Secure Time-Bound Hierarchical Key Assignment Scheme and XML Security. |
GPC |
2010 |
DBLP DOI BibTeX RDF |
|
13 | Jason Crampton, Rosli Daud, Keith M. Martin |
Constructing Key Assignment Schemes from Chain Partitions. (PDF / PS) |
DBSec |
2010 |
DBLP DOI BibTeX RDF |
|
13 | Jyh-haw Yeh |
Enforcing non-hierarchical access policies by hierarchical key assignment schemes. |
Inf. Process. Lett. |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Matthias Gauger, Olga Saukh, Pedro José Marrón |
Enlighten Me! Secure Key Assignment in Wireless Sensor Networks. |
MASS |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Ramon Novales, Neeraj Mittal |
TASK: Template-Based Key Assignment for Confidential Communication in Wireless Networks. |
SRDS |
2009 |
DBLP DOI BibTeX RDF |
|
13 | Hui-Feng Huang, Chin-Chen Chang 0001 |
A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy. |
Fundam. Informaticae |
2008 |
DBLP BibTeX RDF |
|
13 | Debasis Giri, P. D. Srivastava |
A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security. |
Int. J. Netw. Secur. |
2008 |
DBLP BibTeX RDF |
|
13 | Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
New constructions for provably-secure time-bound hierarchical key assignment schemes. |
Theor. Comput. Sci. |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Avinash Srinivasan, Feng Li 0001, Jie Wu 0001, Minglu Li 0001 |
Clique-based group key assignment in Wireless Sensor Networks. |
Int. J. Secur. Networks |
2008 |
DBLP DOI BibTeX RDF |
|
13 | Ya-Fen Chang, Chin-Chen Chang 0001 |
Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy. |
Fundam. Informaticae |
2007 |
DBLP BibTeX RDF |
|
13 | Debasis Giri, Parmeshwary Dayal Srivastava |
An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies. |
Int. J. Netw. Secur. |
2007 |
DBLP BibTeX RDF |
|
13 | Jyh-haw Yeh |
A Time-Bound Hierarchical Key Assignment Cryptosystem with No Lifetime Limit. |
Security and Management |
2007 |
DBLP BibTeX RDF |
|
13 | Hung-Yu Chien, Yuan-Liang Tang, Ying-Lun Chen |
A Secure and Efficient Time-Bound Hierarchical Key Assignment Scheme. |
IMECS |
2007 |
DBLP BibTeX RDF |
|
13 | Jing Zhao, Zhigang Zhang, Maozhi Xu |
A Model of Hierarchical Key Assignment Scheme with CRT. |
CIS |
2007 |
DBLP DOI BibTeX RDF |
|
13 | Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
Enforcing the security of a time-bound hierarchical key assignment scheme. |
Inf. Sci. |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
Unconditionally secure key assignment schemes. |
Discret. Appl. Math. |
2006 |
DBLP DOI BibTeX RDF |
|
13 | Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
Efficient Provably-Secure Hierarchical Key Assignment Schemes. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
13 | Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
13 | Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci |
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. |
IACR Cryptol. ePrint Arch. |
2006 |
DBLP BibTeX RDF |
|
13 | Hui-Feng Huang |
A New Cryptographic Key Assignment Scheme using a One-way Hash Function. |
JCIS |
2006 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #100 of 130 (100 per page; Change: ) Pages: [ 1][ 2][ >>] |
|