More on master keys for group sharing☆
References (1)
- et al.
Master keys for group sharing
Information Processing Lett.
(1981)
Cited by (5)
A two-phase encryption scheme for enhancing database security
1995, The Journal of Systems and SoftwareCryptographic implementation of a tree hierarchy for access control
1988, Information Processing LettersA secure and useful "keyless cryptosystem"
1985, Information Processing LettersA watermarking technique based on one-way hash functions
1999, IEEE Transactions on Consumer ElectronicsFlexible access control with master keys
1990, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
- ☆
Denning is supported in part by NSF Grant MCS 80-15484; Meijer is supported by a scholarship from the Ontario Graduate Scholarship program and Grants A3336 and G0381 from the Natural Sciences and Research Council of Canada; Schneider is supported in part by NSF Grant MCS 76-22360.
Copyright © 1981 Published by Elsevier B.V.