iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1587/TRANSINF.E93.D.1044
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,6]],"date-time":"2022-04-06T01:31:28Z","timestamp":1649208688210},"reference-count":25,"publisher":"Institute of Electronics, Information and Communications Engineers (IEICE)","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEICE Trans. Inf. & Syst."],"published-print":{"date-parts":[[2010]]},"DOI":"10.1587\/transinf.e93.d.1044","type":"journal-article","created":{"date-parts":[[2010,5,6]],"date-time":"2010-05-06T05:56:42Z","timestamp":1273125402000},"page":"1044-1052","source":"Crossref","is-referenced-by-count":5,"title":["Time-Bound Hierarchical Key Assignment: An Overview"],"prefix":"10.1587","volume":"E93-D","author":[{"given":"Wen Tao","family":"ZHU","sequence":"first","affiliation":[{"name":"State Key Laboratory of Information Security, Graduate University of Chinese Academy of Sciences"}]},{"given":"Robert H.","family":"DENG","sequence":"additional","affiliation":[{"name":"School of Information Systems, Singapore Management University"}]},{"given":"Jianying","family":"ZHOU","sequence":"additional","affiliation":[{"name":"Institute for Infocomm Research"}]},{"given":"Feng","family":"BAO","sequence":"additional","affiliation":[{"name":"Institute for Infocomm Research"}]}],"member":"532","reference":[{"key":"1","doi-asserted-by":"crossref","unstructured":"[1] S.-Y. Wang and C.-S. Laih, “Merging: An efficient solution for a time-bound hierarchical key assignment scheme, ” IEEE Trans. Dependable and Secure Computing, vol.3, no.1, pp.91-100, Jan.-March 2006.","DOI":"10.1109\/TDSC.2006.15"},{"key":"2","doi-asserted-by":"crossref","unstructured":"[2] J. Yeh, “An RSA-based time-bound hierarchical key assignment scheme for electronic article subscription, ” Proc. 14th ACM Conference on Information and Knowledge Management (CIKM'05), pp.285-286, 2005.","DOI":"10.1145\/1099554.1099629"},{"key":"3","doi-asserted-by":"crossref","unstructured":"[3] S.G. Akl and P.D. Taylor, “Cryptographic solution to a problem of access control in a hierarchy, ” ACM Trans. Comput. Syst., vol.1, pp.239-248, Aug. 1983.","DOI":"10.1145\/357369.357372"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/69.979981"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cdt:19951788"},{"key":"6","unstructured":"[6] B. Schneier, Applied Cryptography, Second Edition, John Wiley & Sons, New York, 1996."},{"key":"7","doi-asserted-by":"crossref","unstructured":"[7] E. Bertino, B. Carminati, and E. Ferrari, “A temporal key management scheme for secure broadcasting of XML documents, ” Proc. 9th ACM Conference on Computer and Communications Security (CCS'02), pp.31-40, 2002.","DOI":"10.1145\/586110.586116"},{"key":"8","doi-asserted-by":"crossref","unstructured":"[8] X. Yi and Y. Ye, “Security of Tzeng's time-bound key assignment scheme for access control in a hierarchy, ” IEEE Trans. Knowl. Data Eng., vol.15, no.4, pp.1054-1055, July-Aug. 2003.","DOI":"10.1109\/TKDE.2003.1209023"},{"key":"9","doi-asserted-by":"crossref","first-page":"386","DOI":"10.1007\/3-540-44750-4_31","volume":"963","year":"1995","ISSN":"http:\/\/id.crossref.org\/issn\/0302-9743","issn-type":"print"},{"key":"10","doi-asserted-by":"crossref","unstructured":"[10] H.-Y. Chien, “Efficient time-bound hierarchical key assignment scheme, ” IEEE Trans. Knowl. Data Eng., vol.16, no.10, pp.1301-1034, Oct. 2004.","DOI":"10.1109\/TKDE.2004.59"},{"key":"11","doi-asserted-by":"crossref","unstructured":"[11] H.-Y. Chien and J.-K. Jan, “New hierarchical assignment without public key cryptography, ” Comput. Secur., vol.22, pp.523-526, Sept. 2003.","DOI":"10.1016\/S0167-4048(03)00613-8"},{"key":"12","doi-asserted-by":"crossref","unstructured":"[12] X. Yi, “Security of Chien's efficient time-bound hierarchical key assignment scheme, ” IEEE Trans. Knowl. Data Eng., vol.17, no.9, pp.1298-1299, Sept. 2005.","DOI":"10.1109\/TKDE.2005.152"},{"key":"13","doi-asserted-by":"crossref","unstructured":"[13] A. De Santis, A.L. Ferrara, and B. Masucci, “Enforcing the security of a time-bound hierarchical key assignment scheme, ” Inf. Sci., vol.176, pp.1684-1694, June 2006.","DOI":"10.1016\/j.ins.2005.07.002"},{"key":"14","doi-asserted-by":"crossref","unstructured":"[14] E. Bertino, N. Shang, and S.S. Wagstaff, Jr., “An efficient time-bound hierarchical key management scheme for secure broadcasting, ” IEEE Trans. Dependable and Secure Computing, vol.5, pp.65-70, April-June 2008.","DOI":"10.1109\/TDSC.2007.70241"},{"key":"15","doi-asserted-by":"crossref","unstructured":"[15] D.E. Geer Jr., “Complexity is the enemy, ” IEEE Security & Privacy, vol.6, no.6, p.88, Nov.-Dec. 2008.","DOI":"10.1109\/MSP.2008.139"},{"key":"16","doi-asserted-by":"crossref","unstructured":"[16] H.-M. Sun, K.-H. Wang, and C.-M. Chen, “On the security of an efficient time-bound hierarchical key management scheme, ” IEEE Trans. Dependable and Secure Computing, vol.6, no.2, pp.159-160, April-June 2009.","DOI":"10.1109\/TDSC.2009.15"},{"key":"17","doi-asserted-by":"crossref","unstructured":"[17] G. Ateniese, A. De Santis, A.L. Ferrara, and B. Masucci, “Provably-secure time-bound hierarchical key assignment schemes, ” Proc. 13th ACM Conference on Computer and Communications Security (CCS'06), pp.288-297, 2006.","DOI":"10.1145\/1180405.1180441"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2007.08.017"},{"key":"19","doi-asserted-by":"crossref","unstructured":"[19] H.-F. Huang and C.-C. Chang, “A new cryptographic key assignment scheme with time-constraint access control in a hierarchy, ” Computer Standards & Interfaces, vol.26, pp.159-166, May 2004.","DOI":"10.1016\/S0920-5489(03)00073-4"},{"key":"20","doi-asserted-by":"crossref","unstructured":"[20] Q. Tang and C.J. Mitchell, “Comments on a cryptographic key assignment scheme, ” Computer Standards & Interfaces, vol.27, pp.323-326, March 2005.","DOI":"10.1016\/j.csi.2004.07.001"},{"key":"21","doi-asserted-by":"crossref","unstructured":"[21] W.-G. Tzeng, “A secure system for data access based on anonymous authentication and time-dependent hierarchical keys, ” Proc. 1st ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS'06), pp.223-230, 2006.","DOI":"10.1145\/1128817.1128851"},{"key":"22","doi-asserted-by":"crossref","unstructured":"[22] M.J. Atallah, M. Blanton, and K.B. Frikken, “Incorporating temporal capabilities in existing key management schemes, ” Proc. ESORICS'07, Lect. Notes Comput. Sci., vol.4734, pp.515-530, 2007.","DOI":"10.1007\/978-3-540-74835-9_34"},{"key":"23","doi-asserted-by":"crossref","unstructured":"[23] M.J. Atallah, M. Blanton, and K.B. Frikken, “Efficient techniques for realizing geo-spatial access control, ” Proc. 2nd ACM Symposium on InformAtion, Computer and Communications Security (ASIACCS'07), pp.82-92, 2007.","DOI":"10.1145\/1229285.1229301"},{"key":"24","doi-asserted-by":"crossref","first-page":"301","DOI":"10.1007\/978-3-540-46703-8_19","volume":"1736","author":"BRISCOE B","year":"1999","ISSN":"http:\/\/id.crossref.org\/issn\/0302-9743","issn-type":"print"},{"key":"25","doi-asserted-by":"crossref","unstructured":"[25] M. Srivatsa, A. Iyengar, J. Yin, and L. Liu, “A scalable method for access control in location-based broadcast services, ” Proc. 27th IEEE Conference on Computer Communications (INFOCOM'08), pp.834-842, 2008.","DOI":"10.1109\/INFOCOM.2008.60"}],"container-title":["IEICE Transactions on Information and Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.jstage.jst.go.jp\/article\/transinf\/E93.D\/5\/E93.D_5_1044\/_pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,26]],"date-time":"2021-04-26T06:19:33Z","timestamp":1619417973000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.jstage.jst.go.jp\/article\/transinf\/E93.D\/5\/E93.D_5_1044\/_article"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"references-count":25,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2010]]}},"URL":"http:\/\/dx.doi.org\/10.1587\/transinf.e93.d.1044","relation":{},"ISSN":["0916-8532","1745-1361"],"issn-type":[{"value":"0916-8532","type":"print"},{"value":"1745-1361","type":"electronic"}],"subject":[],"published":{"date-parts":[[2010]]}}}