• Reference Citation Analysis
  • v
  • v
  • Find an Article
Find an Article PDF (4594883)   Today's Articles (8)   Subscriber (49330)
For: Chen TS, Chung YF. Hierarchical access control based on Chinese Remainder Theorem and symmetric algorithm. Comput Secur 2002. [DOI: 10.1016/s0167-4048(02)01016-7] [Citation(s) in RCA: 9] [Impact Index Per Article: 0.4] [Reference Citation Analysis] [What about the content of this article? (0)] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
Number Cited by Other Article(s)
1
A Secure and Efficient Digital-Data-Sharing System for Cloud Environments. SENSORS 2019;19:s19122817. [PMID: 31238553 PMCID: PMC6630971 DOI: 10.3390/s19122817] [Citation(s) in RCA: 1] [Impact Index Per Article: 0.2] [Reference Citation Analysis] [Abstract] [Key Words] [Track Full Text] [Download PDF] [Figures] [Subscribe] [Scholar Register] [Received: 04/25/2019] [Revised: 06/12/2019] [Accepted: 06/20/2019] [Indexed: 11/16/2022]
2
Castiglione A, De Santis A, Masucci B, Palmieri F, Huang X, Castiglione A. Supporting dynamic updates in storage clouds with the Akl–Taylor scheme. Inf Sci (N Y) 2017. [DOI: 10.1016/j.ins.2016.08.093] [Citation(s) in RCA: 27] [Impact Index Per Article: 3.9] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 11/30/2022]
3
Lo JW, Hwang MS, Liu CH. A Simple Key Assignment for Access Control Based on Polynomial. ARABIAN JOURNAL FOR SCIENCE AND ENGINEERING 2013. [DOI: 10.1007/s13369-013-0535-z] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
4
Atallah MJ, Blanton M, Fazio N, Frikken KB. Dynamic and Efficient Key Management for Access Hierarchies. ACTA ACUST UNITED AC 2009. [DOI: 10.1145/1455526.1455531] [Citation(s) in RCA: 47] [Impact Index Per Article: 3.1] [Reference Citation Analysis] [Abstract] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/21/2022]
5
Hwang MS, Lo JW, Liu CH. Improvement on the flexible tree-based key management framework. Comput Secur 2005. [DOI: 10.1016/j.cose.2004.09.009] [Citation(s) in RCA: 2] [Impact Index Per Article: 0.1] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/26/2022]
6
Zhong S, Lin T. A comment on the Chen-Chung scheme for hierarchical access control. Comput Secur 2003. [DOI: 10.1016/s0167-4048(03)00513-3] [Citation(s) in RCA: 0] [Impact Index Per Article: 0] [Reference Citation Analysis] [Track Full Text] [Journal Information] [Subscribe] [Scholar Register] [Indexed: 10/27/2022]
PrevPage 1 of 1 1Next
© 2004-2024 Baishideng Publishing Group Inc. All rights reserved. 7041 Koll Center Parkway, Suite 160, Pleasanton, CA 94566, USA