Cryptographic Enforcement of Information Flow Policies Without Public Information (Q2794512): Difference between revisions
From MaRDI portal
Changed an Item |
ReferenceBot (talk | contribs) Changed an Item |
||
Property / cites work | |||
Property / cites work: Provably-secure time-bound hierarchical key assignment schemes / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Digraphs / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Q3651735 / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: New constructions for provably-secure time-bound hierarchical key assignment schemes / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Simple, Efficient and Strongly KI-Secure Hierarchical Key Assignment Schemes / rank | |||
Normal rank | |||
Property / cites work | |||
Property / cites work: Minimum leaf out-branching and related problems / rank | |||
Normal rank |
Latest revision as of 14:20, 11 July 2024
scientific article
Language | Label | Description | Also known as |
---|---|---|---|
English | Cryptographic Enforcement of Information Flow Policies Without Public Information |
scientific article |
Statements
Cryptographic Enforcement of Information Flow Policies Without Public Information (English)
0 references
10 March 2016
0 references