Unconditionally secure key assignment schemes
From MaRDI portal
Publication:2489918
Recommendations
Cites work
- scientific article; zbMATH DE number 107482 (Why is no real title available?)
- scientific article; zbMATH DE number 3614066 (Why is no real title available?)
- scientific article; zbMATH DE number 3639144 (Why is no real title available?)
- A cryptographic key assignment scheme in a hierarchy for access control
- A dynamic cryptographic key assignment scheme in a tree structure
- A linear algorithm for the domination number of a tree
- An improvement of a dynamic cryptographic key assignment scheme in a tree hierarchy
- An optimal algorithm to assign cryptographic keys in a tree structure for access control
- Cryptanalysis of YCN key assignment scheme in a hierarchy
- Cryptographic key assignment schemes for any access control policy
- Unconditionally secure key assignment schemes
Cited in
(11)- An information-theoretic approach to the access control problem.
- Cryptographic key assignment schemes for any access control policy
- Unconditionally secure key assignment schemes
- A novel scheme for image encryption based on a synchronized coupled map
- Unconditionally secure revocable storage: tight bounds, optimal construction, and robustness
- On the relations between security notions in hierarchical key assignment schemes for dynamic structures
- Unconditional secure conference key distribution schemes with disenrollment capability
- Chaotic trigonometric Haar wavelet with focus on image encryption
- Supporting dynamic updates in storage clouds with the Akl-Taylor scheme
- A generic algebraic model for the analysis of cryptographic-key assignment schemes
- On optimal cryptographic key derivation
This page was built for publication: Unconditionally secure key assignment schemes
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q2489918)