Author:
Pan Jeng-Shyang,Wu Tsu-Yang,Chen Chien-Ming,Wang Eric Ke
Publisher
Springer International Publishing
Reference18 articles.
1. Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems (TOCS) 1(3), 239–248 (1983)
2. Ateniese, G., De Santis, A., Ferrara, A.L., Masucci, B.: Provably-secure time-bound hierarchical key assignment schemes. In: Proceedings of the 13th ACM Conference on Computer and Communications security, pp. 288–297. ACM (2006)
3. Ateniese, G., De Santis, A., Ferrara, A.L., Masucci, B.: Provably-secure time-bound hierarchical key assignment schemes. Journal of Cryptology 25(2), 243–270 (2012)
4. Blanton, M., Fazio, N., Frikken, K.B.: Dynamic and efficient key management for access hierarchies. In: Proceedings of the ACM Conference on Computer and Communications Security (2005)
5. Chen, C.M., Wu, T.Y., He, B.Z., Sun, H.M.: An efficient time-bound hierarchical key management scheme without tamper-resistant devices. In: 2012 International Conference on Computing, Measurement, Control and Sensor Network (CMCSN), pp. 285–288. IEEE (2012)