搜索结果: 1-4 共查到“军队指挥学 hierarchical key assignment”相关记录4条 . 查询时间(0.062 秒)
Key Indistinguishability vs. Strong Key Indistinguishability for Hierarchical Key Assignment Schemes
Access control key assignment provable security
2016/1/7
A hierarchical key assignment scheme is a method to assign some private information and encryption keys to a
set of classes in a partially ordered hierarchy, in such a way that the private informatio...
New Constructions for Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
Access control key assignment provable security
2009/1/9
A time-bound hierarchical key assignment scheme is a method to assign time-dependent
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each class in the hierarc...
Efficient Provably-Secure Hierarchical Key Assignment Schemes
Access control key assignment provable security
2009/1/8
A hierarchical key assignment scheme is a method to assign some private information and
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that the
private informati...
Provably-Secure Time-Bound Hierarchical Key Assignment Schemes
Access control key assignment provable security
2008/12/3
A time-bound hierarchical key assignment scheme is a method to assign time-dependent
encryption keys to a set of classes in a partially ordered hierarchy, in such a way that each
class can compute t...