共 50 条
- [21] Modified cryptographic key assignment scheme for a group-oriented user hierarchy [J]. IEICE Trans Fund Electron Commun Comput Sci, 10 (2032-2034):
- [24] Comments on a cryptographic key assignment scheme [J]. COMPUTER STANDARDS & INTERFACES, 2005, 27 (03) : 323 - 326
- [26] A Cryptographic and Time-Constraint Access Control Scheme for Mobile Terminals [J]. NETWORK COMPUTING AND INFORMATION SECURITY, 2012, 345 : 352 - 357
- [27] Cryptographic key assignment scheme for overcoming the incorrectness of the CHW scheme [J]. IEE PROCEEDINGS-COMMUNICATIONS, 2001, 148 (04): : 260 - 264
- [30] An Efficient Key Management Scheme for Access Control in a User Hierarchy [J]. 2009 INTERNATIONAL CONFERENCE ON INFORMATION TECHNOLOGY AND COMPUTER SCIENCE, VOL 1, PROCEEDINGS, 2009, : 550 - +