Hierarchical key assignment without public-key cryptography


Abstract VLSI chips make possible the hardware devices employed in today’s computing environment for security functions. Controlling access in a hierarchy is an interesting research topic in computer security. Many investigations have been published in the literature with solutions involving assigning cryptographic keys to users at different access… (More)
DOI: 10.1016/S0167-4048(01)00711-8


Figures and Tables

Sorry, we couldn't extract any figures or tables for this paper.


Citations per Year

51 Citations

Semantic Scholar estimates that this publication has 51 citations based on the available data.

See our FAQ for additional information.

Slides referencing similar topics