The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase key-assignment (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1992-2003 (15) 2004-2005 (18) 2006 (16) 2007-2008 (23) 2009-2011 (19) 2012-2014 (18) 2015-2020 (15) 2021-2022 (6)
Publication types (Num. hits)
article(65) inproceedings(62) phdthesis(3)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 68 occurrences of 39 keywords

Results
Found 130 publication records. Showing 130 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
53Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci Provably-secure time-bound hierarchical key assignment schemes. Search on Bibsonomy CCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF access control, provable security, key assignment
48Wen-Guey Tzeng A Time-Bound Cryptographic Key Assignment Scheme for Access Control in a Hierarchy. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF cryptographic key assignment, secure broadcasting, cryptographic key backup, access control
46Jyh-haw Yeh An RSA-based time-bound hierarchical key assignment scheme for electronic article subscription. Search on Bibsonomy CIKM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF access control, key assignment
43Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci New constructions for provably-secure time-bound hierarchical key assignment schemes. Search on Bibsonomy SACMAT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF access control, provable security, key assignment
43Tatsuyuki Matsushita, Hideki Imai Hierarchical Key Assignment for Black-Box Tracing with Efficient Ciphertext Size. Search on Bibsonomy ICICS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Hierarchical key assignment, black-box tracing, reduced ciphertext size
41André Adelsbach, Jörg Schwenk Key-assignment strategies for CPPM. Search on Bibsonomy MM&Sec The full citation details ... 2004 DBLP  DOI  BibTeX  RDF CPPM, device revocation, key-management, content protection, key-assignment
38Shyh-Yih Wang, Chi-Sung Laih Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Access control, cryptography, key management
38Yi-Hua E. Yang, Joseph D. Touch Protocol Family for Optimal and Deterministic Symmetric Key Assignment. Search on Bibsonomy ICN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Collusion resilience, Maximum-Distance Separable code, symmetric key assignment, symmetric key pre-distribution, Reed-Solomon code
36Jason Crampton, Keith M. Martin, Peter R. Wild On Key Assignment for Hierarchical Access Control. Search on Bibsonomy CSFW The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
36Xun Yi Security of Chien's Efficient Time-Bound Hierarchical Key Assignment Scheme. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF hierarchical key assignment, Cryptography
35Tzer-Shyong Chen, Kuo-Hsuan Huang, Yu-Fang Chung Modified Cryptographic Key Assignment Scheme for Overcoming the Incorrectness of the CHW Scheme. Search on Bibsonomy EEE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Cryptographic key assignment scheme, predecessor, successor, user hierarchy, partial order set
35Xun Yi, Yiming Ye Security of Tzeng's Time-Bound Key Assignment Scheme for Access Control in a Hierarchy. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Access control, RSA, collusion attack, key assignment
29Ramon Novales, Neeraj Mittal, Kamil Saraç SKAIT: A Parameterized Key Assignment Scheme for Wireless Networks. Search on Bibsonomy ISPDC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF confidential communication, symmetric key assignment, key pre-distribution, collusion resistance
29Hsing-Chung Chen, Shiuh-Jeng Wang, Jyh-Horng Wen, Chung-Wei Chen Flexible Key Assignment for a Time-Token Constraint in a Hierarchy. Search on Bibsonomy MUE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF proactive key management, time-token, access control, key assignment
27Hung-Yu Chien Efficient Time-Bound Hierarchical Key Assignment Scheme. Search on Bibsonomy IEEE Trans. Knowl. Data Eng. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci A New Key Assignment Scheme for Access Control in a Complete Tree Hierarchy. Search on Bibsonomy WCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
24Chin-Chen Chang 0001, Iuon-Chang Lin, Hui-Min Tsai, Hsiao-Hsi Wang A Key Assignment Scheme for Controlling Access in Partially Ordered User Hierarchies. Search on Bibsonomy AINA (2) The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
24Anna Lisa Ferrara, Barbara Masucci An Information-Theoretic Approach to the Access Control Problem. Search on Bibsonomy ICTCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
24Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci Efficient Provably-Secure Hierarchical Key Assignment Schemes. Search on Bibsonomy MFCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
24Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
24Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2014 DBLP  BibTeX  RDF
23Chun-Ying Huang, Yun-Peng Chiu, Kuan-Ta Chen, Chin-Laung Lei A distributed key assignment protocol for secure multicast based on proxy cryptography. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ElGamal cryptosystem, key composition, proxy cryptography, secure multicast
22Feng Li 0001, Jie Wu 0001 A probabilistic voting-based filtering scheme in wireless sensor networks. Search on Bibsonomy IWCMC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF probabilistic key assignment, voting method, wireless sensor networks, wireless communications, node compromise
21Wai-Meng Chew, Chi-Hung Chi, Tieyan Li Efficient Key Assignment Scheme for Mobile Agent Systems. Search on Bibsonomy ICTAI The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
20Qingyu Xu, Mingxing He, Lein Harn An Improved Time-Bound Hierarchical Key Assignment Scheme. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
20Anne V. D. M. Kayem, Patrick Martin 0001, Selim G. Akl Heuristics for Improving Cryptographic Key Assignment in a Hierarchy. Search on Bibsonomy AINA Workshops (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
19Paolo D'Arco, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci Security and Tradeoffs of the Akl-Taylor Scheme and Its Variants. Search on Bibsonomy MFCS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
18Purva Sharma, Vimal Bhatia, Shashi Prakash Routing and Scheduling of Key Assignment in Optical Networks secured by Quantum Key Distribution. Search on Bibsonomy ANTS The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
18Yuan Cao, Yongli Zhao, Jun Li 0059, Rui Lin 0001, Jie Zhang 0006, Jiajia Chen 0001 Reinforcement Learning Based Multi-Tenant Secret-Key Assignment for Quantum Key Distribution Networks. Search on Bibsonomy OFC The full citation details ... 2019 DBLP  BibTeX  RDF
18Eduarda Simões Veloso Freire Non-interactive key exchange and key assignment schemes. Search on Bibsonomy 2014   RDF
18Jyh-haw Yeh A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
18Chu-Hsing Lin Hierarchical key assignment without public-key cryptography. Search on Bibsonomy Comput. Secur. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
18Mohammed A. Moharrum, Mohamed Eltoweissy A study of static versus dynamic keying schemes in sensor networks. Search on Bibsonomy PE-WASUN The full citation details ... 2005 DBLP  DOI  BibTeX  RDF dynamic keying, exclusion-basis systems, sensor networks, key management, secure communications
17Mohamed F. Younis, Kajaldeep Ghumman, Mohamed Eltoweissy Location-Aware Combinatorial Key Management Scheme for Clustered Sensor Networks. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF location-aware protocols, exclusion basis systems, Wireless sensor networks, combinatorial optimization, key management, secure group communications, collusion attacks, energy efficient design
17Hao Yuan, Mikhail J. Atallah Efficient and secure distribution of massive geo-spatial data. Search on Bibsonomy GIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF geo-spatial access control, key assignment and derivation, key management
17Jieh-Shan Yeh, Shang-Ru Yang, Chin-Chen Chang 0001, Tzungher Chen Assigning Keys in a Hierarchy. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF access control, key management, broadcast encryption, group key, key assignment
17Mikhail J. Atallah, Marina Blanton, Keith B. Frikken Efficient techniques for realizing geo-spatial access control. Search on Bibsonomy AsiaCCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF geo-spatial access control, key assignment and derivation, key management
17Tzer-Shyong Chen, Yu-Fang Chung, Chang-Sin Tian A Novel Key Management Scheme for Dynamic Access Control in a User Hierarchy. Search on Bibsonomy COMPSAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Cryptographic Key Assignment and User Hierarchy, Access Control, One-Way Hash Function
15Jian Wang 0038, Lein Harn, Hideki Imai Key Management for Multicast Fingerprinting. Search on Bibsonomy ICISS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
13Hua Sun 0001 Compound Secure Groupcast: Key Assignment for Selected Broadcasting. Search on Bibsonomy IEEE J. Sel. Areas Inf. Theory The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Xinyi He, Lin Li, Dahai Han, Yongli Zhao, Avishek Nag, Wei Wang 0116, Hua Wang, Yuan Cao, Jie Zhang 0006 Routing and secret key assignment for secure multicast services in quantum satellite networks. Search on Bibsonomy JOCN The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
13Baris Celiktas A hierarchical key assignment scheme for access control in cloud computing (Bulut bilişimde erişim kontrolü için hiyerarşik anahtar atama şeması) Search on Bibsonomy 2022   RDF
13Hua Sun 0001 Compound Secure Groupcast: Key Assignment for Selected Broadcasting. Search on Bibsonomy ISIT The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Anna Lisa Ferrara, Federica Paci, Chiara Ricciardi Verifiable Hierarchical Key Assignment Schemes. Search on Bibsonomy DBSec The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
13Hua Sun 0001 Compound Secure Groupcast: Key Assignment for Selected Broadcasting. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
13Anna Lisa Ferrara, Chiara Ricciardi Verifiable Hierarchical Key Assignment Schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
13Jeroen Pijnenburg, Bertram Poettering Key Assignment Schemes with Authenticated Encryption, revisited. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2020 DBLP  BibTeX  RDF
13Jeroen Pijnenburg, Bertram Poettering Key Assignment Schemes with Authenticated Encryption, revisited. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
13Suyash Kandele, Souradyuti Paul Key Assignment Scheme with Authenticated Encryption. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2018 DBLP  BibTeX  RDF
13Suyash Kandele, Souradyuti Paul Key Assignment Scheme with Authenticated Encryption. Search on Bibsonomy IACR Trans. Symmetric Cryptol. The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
13Ping-Kun Hsu, Mu-Ting Lin, Iuon-Chang Lin Flexible Hierarchical Key Assignment Scheme with Time-Based Assured Deletion for Cloud Storage. Search on Bibsonomy ICS The full citation details ... 2018 DBLP  DOI  BibTeX  RDF
13Naomi Farley On key assignment schemes and cryptographic enforcement mechanisms for information flow policies. Search on Bibsonomy 2018   RDF
13Yi-Ruei Chen, Wen-Guey Tzeng Hierarchical Key Assignment with Dynamic Read-Write Privilege Enforcement and Extended KI-Security. Search on Bibsonomy ACNS The full citation details ... 2017 DBLP  DOI  BibTeX  RDF
13Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci, Francesco Palmieri 0002, Aniello Castiglione On the Relations Between Security Notions in Hierarchical Key Assignment Schemes for Dynamic Structures. Search on Bibsonomy ACISP (2) The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
13Massimo Cafaro, Roberto Civino, Barbara Masucci On the Equivalence of Two Security Notions for Hierarchical Key Assignment Schemes in the Unconditional Setting. Search on Bibsonomy IEEE Trans. Dependable Secur. Comput. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
13Jeng-Shyang Pan 0001, Tsu-Yang Wu, Chien-Ming Chen 0001, Eric Ke Wang Security Analysis of a Time-Bound Hierarchical Key Assignment Scheme. Search on Bibsonomy IIH-MSP The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
13Jeng-Shyang Pan 0001, Tsu-Yang Wu, Chien-Ming Chen 0001, Eric Ke Wang An Efficient Solution for Time-Bound Hierarchical Key Assignment Scheme. Search on Bibsonomy ICGEC (2) The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
13Ramon Novales, Neeraj Mittal, Kamil Saraç SKAIT: A parameterized key assignment scheme for confidential communication in resource constrained ad hoc wireless networks. Search on Bibsonomy Ad Hoc Networks The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
13Khair Eddin Sabri Algebraic Analysis of Object-Based Key Assignment Schemes. Search on Bibsonomy J. Softw. The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
13Massimo Cafaro, Roberto Civino, Barbara Masucci On the Unconditional Security of Hierarchical Key Assignment Schemes. Search on Bibsonomy CoRR The full citation details ... 2014 DBLP  BibTeX  RDF
13Arcangelo Castiglione, Alfredo De Santis, Barbara Masucci Hierarchical and Shared Key Assignment. Search on Bibsonomy NBiS The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
13Tsu-Yang Wu, Chengxiang Zhou, Chien-Ming Chen 0001, Eric Ke Wang, Jeng-Shyang Pan 0001 Towards Time-Bound Hierarchical Key Assignment for Secure Data Access Control. Search on Bibsonomy MISNC The full citation details ... 2014 DBLP  DOI  BibTeX  RDF
13Cheng-Chi Lee, Yan-Ming Lai, Chin-Sung Hsiao Cryptanalysis of a simple key assignment for access control based on polynomial. Search on Bibsonomy J. Inf. Secur. Appl. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
13Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci A note on time-bound hierarchical key assignment schemes. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
13James Alderman, Jason Crampton On the Use of Key Assignment Schemes in Authentication Protocols Search on Bibsonomy CoRR The full citation details ... 2013 DBLP  BibTeX  RDF
13Naveen Kumar 0011, Anish Mathuria, Manik Lal Das Simple and Efficient Time-Bound Hierarchical Key Assignment Scheme - (Short Paper). Search on Bibsonomy ICISS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
13James Alderman, Jason Crampton On the Use of Key Assignment Schemes in Authentication Protocols. Search on Bibsonomy NSS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
13Shoko Imaizumi A collusion-free key assignment scheme for hierarchical access control using recursive hash chains. Search on Bibsonomy ISCAS The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
13Eduarda S. V. Freire 0001, Kenneth G. Paterson, Bertram Poettering Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. Search on Bibsonomy CT-RSA The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
13Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. Search on Bibsonomy J. Cryptol. The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
13Eduarda S. V. Freire 0001, Kenneth G. Paterson, Bertram Poettering Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2012 DBLP  BibTeX  RDF
13Khair Eddin Sabri, Ridha Khédri A Generic Algebraic Model for the Analysis of Cryptographic-Key Assignment Schemes. Search on Bibsonomy FPS The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
13Shoko Imaizumi, Naokazu Aoki, Hiroyuki Kobayashi, Hitoshi Kiya Hierarchical Key Assignment Scheme for Multimedia Access Control with Modified Hash Chain. Search on Bibsonomy IIH-MSP The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
13Jung-Wen Lo, Min-Shiang Hwang, Chia-Hsin Liu An efficient key assignment scheme for access control in a large leaf class hierarchy. Search on Bibsonomy Inf. Sci. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
13Ramon Novales, Neeraj Mittal Parameterized key assignment for confidential communication in wireless networks. Search on Bibsonomy Ad Hoc Networks The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
13Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci Efficient provably-secure hierarchical key assignment schemes. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
13Eduarda S. V. Freire 0001, Kenneth G. Paterson Provably Secure Key Assignment Schemes from Factoring. Search on Bibsonomy ACISP The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
13Wen Tao Zhu, Robert H. Deng, Jianying Zhou 0001, Feng Bao 0001 Applying Time-Bound Hierarchical Key Assignment in Wireless Sensor Networks. Search on Bibsonomy ICICS The full citation details ... 2011 DBLP  DOI  BibTeX  RDF
13Wen Tao Zhu, Robert H. Deng, Jianying Zhou 0001, Feng Bao 0001 Time-Bound Hierarchical Key Assignment: An Overview. Search on Bibsonomy IEICE Trans. Inf. Syst. The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
13Jason J. Haas, Yih-Chun Hu, Kenneth P. Laberteaux The impact of key assignment on VANET privacy. Search on Bibsonomy Secur. Commun. Networks The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
13Hung-Yu Chien, Ying-Lun Chen, Chien-Feng Lo, Yuh-Ming Huang A Novel E-Newspapers Publication System Using Provably Secure Time-Bound Hierarchical Key Assignment Scheme and XML Security. Search on Bibsonomy GPC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
13Jason Crampton, Rosli Daud, Keith M. Martin Constructing Key Assignment Schemes from Chain Partitions. (PDF / PS) Search on Bibsonomy DBSec The full citation details ... 2010 DBLP  DOI  BibTeX  RDF
13Jyh-haw Yeh Enforcing non-hierarchical access policies by hierarchical key assignment schemes. Search on Bibsonomy Inf. Process. Lett. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Matthias Gauger, Olga Saukh, Pedro José Marrón Enlighten Me! Secure Key Assignment in Wireless Sensor Networks. Search on Bibsonomy MASS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Ramon Novales, Neeraj Mittal TASK: Template-Based Key Assignment for Confidential Communication in Wireless Networks. Search on Bibsonomy SRDS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
13Hui-Feng Huang, Chin-Chen Chang 0001 A Novel Cryptographic Key Assignment Scheme with ID-Based Access Control in a Hierachy. Search on Bibsonomy Fundam. Informaticae The full citation details ... 2008 DBLP  BibTeX  RDF
13Debasis Giri, P. D. Srivastava A Cryptographic Key Assignment Scheme for Access Control in Poset Ordered Hierarchies with Enhanced Security. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2008 DBLP  BibTeX  RDF
13Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci New constructions for provably-secure time-bound hierarchical key assignment schemes. Search on Bibsonomy Theor. Comput. Sci. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Avinash Srinivasan, Feng Li 0001, Jie Wu 0001, Minglu Li 0001 Clique-based group key assignment in Wireless Sensor Networks. Search on Bibsonomy Int. J. Secur. Networks The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
13Ya-Fen Chang, Chin-Chen Chang 0001 Tolerant Key Assignment for Enforcing Complicated Access Control Policies in a Hierarchy. Search on Bibsonomy Fundam. Informaticae The full citation details ... 2007 DBLP  BibTeX  RDF
13Debasis Giri, Parmeshwary Dayal Srivastava An Asymmetric Cryptographic Key Assignment Scheme for Access Control in Tree Structural Hierarchies. Search on Bibsonomy Int. J. Netw. Secur. The full citation details ... 2007 DBLP  BibTeX  RDF
13Jyh-haw Yeh A Time-Bound Hierarchical Key Assignment Cryptosystem with No Lifetime Limit. Search on Bibsonomy Security and Management The full citation details ... 2007 DBLP  BibTeX  RDF
13Hung-Yu Chien, Yuan-Liang Tang, Ying-Lun Chen A Secure and Efficient Time-Bound Hierarchical Key Assignment Scheme. Search on Bibsonomy IMECS The full citation details ... 2007 DBLP  BibTeX  RDF
13Jing Zhao, Zhigang Zhang, Maozhi Xu A Model of Hierarchical Key Assignment Scheme with CRT. Search on Bibsonomy CIS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
13Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci Enforcing the security of a time-bound hierarchical key assignment scheme. Search on Bibsonomy Inf. Sci. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci Unconditionally secure key assignment schemes. Search on Bibsonomy Discret. Appl. Math. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
13Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci Efficient Provably-Secure Hierarchical Key Assignment Schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
13Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
13Giuseppe Ateniese, Alfredo De Santis, Anna Lisa Ferrara, Barbara Masucci Provably-Secure Time-Bound Hierarchical Key Assignment Schemes. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2006 DBLP  BibTeX  RDF
13Hui-Feng Huang A New Cryptographic Key Assignment Scheme using a One-way Hash Function. Search on Bibsonomy JCIS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 130 (100 per page; Change: )
Pages: [1][2][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license