Hierarchical access control with time-bound constraints based upon Chinese remainder theorem

被引:0
|
作者
Department of Applied Mathematics, National Chiayi University, No.300 Syuefu Rd., Chiayi City 60004, Taiwan [1 ]
机构
来源
WSEAS Trans. Inf. Sci. Appl. | 2007年 / 6卷 / 1251-1256期
关键词
15;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:1251 / 1256
相关论文
共 50 条
  • [31] Blockchain and NFTs for Time-Bound Access and Monetization of Private Data
    Madine, Mohammad
    Salah, Khaled
    Jayaraman, Raja
    Battah, Ammar
    Hasan, Haya
    Yaqoob, Ibrar
    IEEE ACCESS, 2022, 10 : 94186 - 94202
  • [32] IP Traceback Based on Chinese Remainder Theorem
    Wuu, Lih-Chyau
    Hung, Chi-Hsiang
    Yang, Jyun-Yan
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2011, 27 (06) : 1985 - 1999
  • [33] An Efficient Solution for Time-Bound Hierarchical Key Assignment Scheme
    Pan, Jeng-Shyang
    Wu, Tsu-Yang
    Chen, Chien-Ming
    Wang, Eric Ke
    GENETIC AND EVOLUTIONARY COMPUTING, VOL II, 2016, 388 : 3 - 9
  • [34] Ip traceback based on Chinese remainder theorem
    Wuu, Lih-Chyau
    Liu, Tzong-Jye
    Yang, Jyun-Yan
    PROCEEDINGS OF THE SIXTH IASTED INTERNATIONAL CONFERENCE ON COMMUNICATIONS, INTERNET, AND INFORMATION TECHNOLOGY, 2007, : 214 - +
  • [35] A Time-Bound and Hierarchical Key Management Scheme for Secure Multicast Systems
    Victor R. L. Shen
    Wei-Chieh Huang
    Wireless Personal Communications, 2015, 85 : 1741 - 1764
  • [36] An efficient time-bound hierarchical key management scheme for secure broadcasting
    Bertino, Elisa
    Shang, Ning
    Wagstaff, Samuel S., Jr.
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2008, 5 (02) : 65 - 70
  • [37] A Time-Bound and Hierarchical Key Management Scheme for Secure Multicast Systems
    Shen, Victor R. L.
    Huang, Wei-Chieh
    WIRELESS PERSONAL COMMUNICATIONS, 2015, 85 (04) : 1741 - 1764
  • [38] A Novel Time-bound Hierarchical Key Assignment Scheme for Mobile Agent
    Liu, Chia-Hui
    Chung, Yu-Fang
    Jhuo, Jin-De
    Chen, Tzer-Shyong
    Wang, Sheng-De
    INTERNATIONAL MULTICONFERENCE OF ENGINEERS AND COMPUTER SCIENTISTS (IMECS 2010), VOLS I-III, 2010, : 258 - +
  • [39] On the Security of an Efficient Time-Bound Hierarchical Key Management Scheme with Biometrics
    Femila, M. Daris
    Irudhayaraj, A. Anthony
    PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON DATA STORAGE AND DATA ENGINEERING (DSDE 2010), 2010, : 283 - 286
  • [40] Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
    Ateniese, Giuseppe
    De Santis, Alfredo
    Ferrara, Anna Lisa
    Masucci, Barbara
    JOURNAL OF CRYPTOLOGY, 2012, 25 (02) : 243 - 270