Author:
Chung Yu Fang,Lee Hsiu Hui,Lai Feipei,Chen Tzer Shyong
Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference23 articles.
1. Elliptic curve cryptography engineering;Cilardo;Proceedings of the IEEE,2006
2. Elliptic-curve cryptography;Fernandes;Dr. Dobb’s Journal,1999
3. A.D. Santis, A.L. Ferrara, B. Masucci, A new key assignment scheme for access control in a complete tree hierarchy, in: Proceeding of the International Workshop on Coding and Cryptography—WCC 2005, LNCS 3969, 2006, pp. 202–217.
4. Cryptographic key assignment schemes for any access control policy;Santis;Information Processing Letters,2004
5. Enforcing the security of a time-bound hierarchical key assignment scheme;Santis;Information Sciences,2006
Cited by
38 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献