Publisher
Springer Berlin Heidelberg
Reference25 articles.
1. S. G. Akl and P. D. Taylor, “Cryptographic Solution to a Problem of Access Control in a Hierarchy,” ACM Transactions on Computer Systems, Vol. 1, No. 3, pp. 239–248, 1983.
2. Lect Notes Comput Sci;J. Anzai,1999
3. Lect Notes Comput Sci;S. Berkovits,1991
4. Lect Notes Comput Sci;D. Boneh,1999
5. Lect Notes Comput Sci;R. Canetti,1999
Cited by
34 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献