Author:
Kim Yongtae,Kim Chang Han,Youn Taek-Young
Publisher
Springer Berlin Heidelberg
Reference12 articles.
1. Akl, S.G., Taylor, P.D.: Cryptographic Solution to a Multilevel Security Problem. In: CRYPTO 1982, pp. 237–249 (1982)
2. Akl, S.G., Taylor, P.D.: Cryptographic Solution to a Problem of Access Controlin Hierarchy. ACM Trans. Computer System 1(3), 239–248 (1983)
3. Buchmann, J., Williams, H.C.: A key-exchange system based on imaginary quadratic fields. J. Cryptology 1, 107–118 (1988)
4. Cox, D.: Primes of the form x 2 + n y 2. Wiley, New York (1989)
5. Cohen, H.: A course in computational algebraic number theory. Springer, Berlin (2000)