Hierarchical access control with time-bound constraints based upon Chinese remainder theorem

被引:0
|
作者
Department of Applied Mathematics, National Chiayi University, No.300 Syuefu Rd., Chiayi City 60004, Taiwan [1 ]
机构
来源
WSEAS Trans. Inf. Sci. Appl. | 2007年 / 6卷 / 1251-1256期
关键词
15;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1251 / 1256
相关论文
共 50 条
  • [21] A hierarchical key management scheme using Chinese remainder theorem
    Xu, Yanyan
    Xu, Zhengquan
    Chen, Xi
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2010, 38 (12): : 65 - 68
  • [22] A secure and efficient time-bound hierarchical key assignment scheme
    Chien, Hung-Yu
    Tang, Yuan-Liang
    Chen, Ying-Lun
    IMECS 2007: INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS, VOLS I AND II, 2007, : 371 - +
  • [23] Enforcing the security of a time-bound hierarchical key assignment scheme
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    INFORMATION SCIENCES, 2006, 176 (12) : 1684 - 1694
  • [24] A Chinese Remainder Theorem Based Key Management Algorithm for Hierarchical Wireless Sensor Network
    Bhaskar, Pranave Kumar
    Pais, Alwyn R.
    DISTRIBUTED COMPUTING AND INTERNET TECHNOLOGY, ICDCIT 2015, 2015, 8956 : 311 - 317
  • [25] Security Analysis of A Time-bound Hierarchical Key Assignment Scheme
    Pan, Jeng-Shyang
    Wu, Tsu-Yang
    Chen, Chien-Ming
    Wang, Eric Ke
    2015 INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING (IIH-MSP), 2015, : 203 - 206
  • [26] On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme
    Sun, Hung-Min
    Wang, King-Hang
    Chen, Chien-Ming
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2009, 6 (02) : 159 - 160
  • [27] Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy
    Yi, X
    Ye, YM
    IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2003, 15 (04) : 1054 - 1055
  • [28] A SECURE TIME-BOUND HIERARCHICAL KEY MANAGEMENT SCHEME BASED ON ECC FOR MOBILE AGENTS
    Huang, Jen-Yan
    Chung, Yu-Fang
    Chen, Tzer-Shyong
    Liao, I-En
    INTERNATIONAL JOURNAL OF INNOVATIVE COMPUTING INFORMATION AND CONTROL, 2010, 6 (05): : 2159 - 2170
  • [29] Data Hiding Based on The Chinese Remainder Theorem
    Wang, Chun-Cheng
    Lin, Tsung-Han
    Kuo, Wen-Chung
    Kuo, Wen-Chung (simonkuo@yuntech.edu.tw), 1600, Femto Technique Co., Ltd. (23): : 1118 - 1125
  • [30] PDF steganography based on Chinese Remainder Theorem
    Ekodeck, Stephane Gael R.
    Ndoundam, Rene
    JOURNAL OF INFORMATION SECURITY AND APPLICATIONS, 2016, 29 : 1 - 15