Hierarchical key assignment without public-key cryptography

Abstract

Abstract VLSI chips make possible the hardware devices employed in today’s computing environment for security functions. Controlling access in a hierarchy is an interesting research topic in computer security. Many investigations have been published in the literature with solutions involving assigning cryptographic keys to users at different access… (More)
DOI: 10.1016/S0167-4048(01)00711-8

Topics

Figures and Tables

Sorry, we couldn't extract any figures or tables for this paper.

Statistics

01020'05'07'09'11'13'15'17
Citations per Year

51 Citations

Semantic Scholar estimates that this publication has 51 citations based on the available data.

See our FAQ for additional information.

Slides referencing similar topics