搜索结果: 1-3 共查到“军队指挥学 Incorporating”相关记录3条 . 查询时间(0.078 秒)
ID-HABE: Incorporating ID-based Revocation, Delegation, and Authority Hierarchy into Attribute-Based Encryption
Identity-Based Revocation Delegation Attribute-Based Encryption
2017/11/20
Ciphertext-Policy Attribute-Based Encryption (CP-ABE) has been proposed to implement fine-grained access control. Data owners encrypt data with a certain access policy so that only data users whose at...
ASICS: Authenticated Key Exchange Security Incorporating Certification Systems
authenticated key exchange (AKE) unknown key share (UKS) attacks
2014/3/12
Most security models for authenticated key exchange (AKE) do not explicitly model the associated certification system, which includes the certification authority (CA) and its behaviour. However, there...
Incorporating Temporal Capabilities in Existing Key Management Schemes
Incorporating Temporal Capabilities Key Management Schemes
2008/8/20
The problem of key management in access hierarchies is how to assign keys to users and classes such that each user, after receiving her secret key(s), is able to independently compute access keys for ...