Elsevier

Information Processing Letters

Volume 13, Issue 3, 13 December 1981, Pages 125-126
Information Processing Letters

More on master keys for group sharing

https://doi.org/10.1016/0020-0190(81)90125-3Get rights and content

References (1)

Cited by (5)

  • A two-phase encryption scheme for enhancing database security

    1995, The Journal of Systems and Software
  • A secure and useful "keyless cryptosystem"

    1985, Information Processing Letters
  • A watermarking technique based on one-way hash functions

    1999, IEEE Transactions on Consumer Electronics
  • Flexible access control with master keys

    1990, Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)

Denning is supported in part by NSF Grant MCS 80-15484; Meijer is supported by a scholarship from the Ontario Graduate Scholarship program and Grants A3336 and G0381 from the Natural Sciences and Research Council of Canada; Schneider is supported in part by NSF Grant MCS 76-22360.

View full text