A Novel Key Management Scheme Based on Discrete Logarithms and Polynomial Interpolations
- 31 March 2002
- journal article
- editorial
- Published by Elsevier BV in Computers & Security
- Vol. 21 (2), 164-171
- https://doi.org/10.1016/s0167-4048(02)00211-0
Abstract
No abstract availableKeywords
This publication has 16 references indexed in Scilit:
- Cryptographic key assignment scheme for dynamic access control in a user hierarchyIEE Proceedings - Computers and Digital Techniques, 1999
- A cryptographic implementation for dynamic access control in a user hierarchyComputers & Security, 1995
- Controlling access in tree hierarchiesInformation Sciences, 1994
- Modified Chang-Hwang-Wu access control schemeElectronics Letters, 1993
- Cryptographic key assignment scheme for access control in a hierarchyInformation Systems, 1992
- A cryptographic key generation scheme for multilevel data securityComputers & Security, 1990
- Cryptographic implementation of a tree hierarchy for access controlInformation Processing Letters, 1988
- Cryptographic solution to a problem of access control in a hierarchyACM Transactions on Computer Systems, 1983
- An improved algorithm for computing logarithms overGF(p)and its cryptographic significance (Corresp.)IEEE Transactions on Information Theory, 1978
- New directions in cryptographyIEEE Transactions on Information Theory, 1976