Learn More
Key management becomes more difficult in multi-privileged communications due to the dynamic membership and the complex relations between users and resources. In this paper, we propose a novel key management scheme in which the key graph is based on multiway trees. Chinese remainder theorem is employed to combine some encrypted rekeying materials into a(More)
The influence of safety risk assessment is being gradually recog-nized along with increasing importance of system safety. In view of the effectiveness of probabilistic influence diagram (PID) in probability reasoning, PID was introduced into system safety risk assessment. Combining the object-oriented method of PID with the traditional risk analysis method,(More)
  • 1