共 50 条
- [31] Attacks on a secure group communication scheme with hierarchical access control [J]. 2004 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY, PROCEEDINGS, 2004, : 14 - 14
- [33] Secure Authorization for Controlling Access via Key Management Scheme [J]. 2013 IEEE INTERNATIONAL CONFERENCE OF IEEE REGION 10 (TENCON), 2013,
- [34] An Efficient Hierarchical Key Management Scheme for Access Medical Database [J]. PROCEEDINGS OF THE 2017 IEEE INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND ENGINEERING (IEEE-ICICE 2017), 2017, : 461 - 463
- [35] A Hierarchical Key Management Scheme for Cross-Domain Secure Deduplication [J]. Mobile Networks and Applications, 2023, 28 : 473 - 485
- [36] A secure hierarchical key management scheme in mobile ad hoc networks [J]. Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2010, 41 (01): : 201 - 206
- [37] A Hierarchical Key Management Scheme for Cross-Domain Secure Deduplication [J]. MOBILE NETWORKS & APPLICATIONS, 2023, 28 (02): : 473 - 485
- [40] Secure Access Control Scheme of RFID System Application [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 525 - 528