完整後設資料紀錄
DC 欄位 | 值 | 語言 |
---|---|---|
dc.contributor.author | Hwang, Tzonelih | |
dc.contributor.author | Lee, Narn-Yih | |
dc.contributor.author | Chang, Chin-Chen | |
dc.date.accessioned | 2009-08-23T04:39:18Z | |
dc.date.accessioned | 2020-05-25T06:25:13Z | - |
dc.date.available | 2009-08-23T04:39:18Z | |
dc.date.available | 2020-05-25T06:25:13Z | - |
dc.date.issued | 2006-10-31T09:13:54Z | |
dc.date.submitted | 1996-12-19 | |
dc.identifier.uri | http://dspace.lib.fcu.edu.tw/handle/2377/2947 | - |
dc.description.abstract | In 1992, Chang, Hwang and Wu proposed a cryptographic key assignment scheme based on Newton’s Interpolation method and a predefined one-way function to solve the access control problem in a user hierarchy. In this paper, we shall show that their scheme is problematic in controlling access to all types of hierarchical organizations. Furthermore, we show that their scheme is not secure enough by presenting an attack on it. | |
dc.description.sponsorship | 中山大學,高雄市 | |
dc.format.extent | 7p. | |
dc.format.extent | 343099 bytes | |
dc.format.mimetype | application/pdf | |
dc.language.iso | zh_TW | |
dc.relation.ispartofseries | 1996 ICS會議 | |
dc.subject.other | Key Distribution | |
dc.title | On the Security of Chang et al.s' Cryptographic Key Assignment Scheme for Access Control in a Hierarchy | |
分類: | 1996年 ICS 國際計算機會議 |
文件中的檔案:
檔案 | 描述 | 大小 | 格式 | |
---|---|---|---|---|
ce07ics001996000247.pdf | 337.37 kB | Adobe PDF | 檢視/開啟 |
在 DSpace 系統中的文件,除了特別指名其著作權條款之外,均受到著作權保護,並且保留所有的權利。