Author:
Koti Nishat,Purushothama B. R.
Reference25 articles.
1. Akl S.G., Taylor P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems (TOCS), vol. 1, no. 3, pp. 239–248 (1983)
2. Chang C.C., Buehrer D.J.: Access control in a hierarchy using a one-way trap door function. Computers & Mathematics with Applications, Elsevier, vol. 26, no. 5, pp. 71–76 (1993)
3. He M., Fan P., Kaderali F., Yuan D.: Access key distribution scheme for level-based hierarchy. Proceedings of the Fourth International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT 2003), pp. 942–945 (2003)
4. Liaw H.T., Wang S.J., Lei C.L.: A dynamic cryptographic key assignment scheme in a tree structure. Computers & Mathematics with Applications, Elsevier, vol. 25, no. 6, pp. 109–114 (1993)
5. MacKinnon S.J., Taylor P.D., Meijer H., Akl S.G.: An optimal algorithm for assigning cryptographic keys to control access in a hierarchy. IEEE Transactions on Computers, no. 9, pp. 797–802 (1985)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献