Author:
Shen Victor R. L.,Huang Wei-Chieh
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference19 articles.
1. Akl, S. G., & Taylor, P. D. (1983). Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems, 1(3), 239–248.
2. Alcaraz, C., Lopez, J., Roman, R., & Chen, H.-H. (2012). Selecting key management schemes for WSN applications. Computers and Security, 31(8), 956–966.
3. Boneh, D., & Franklin, M. (2001). Identity-based encryption from Weil pairing. In Advances in Cryptology-proceedings of CRYPTO 2001, Springer-Verlag LNCS 2139 (pp. 213–229).
4. Chang, C. C., Hwang, R. J., & Wu, T. C. (1992). Cryptographic key assignment scheme for access control in a hierarchy. Information Systems, 17(3), 243–247.
5. Chen, H. Y. (2004). Efficient time bound hierarchical key assignment scheme. IEEE Transaction on Knowledge and Data Engineering, 16(10), 1302–1304.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献