Publication: Design of a lattice-based access control scheme
| dc.contributor.author | Demirer, Rüştü Murat | |
| dc.contributor.author | Chiang, Chia-Chu | |
| dc.contributor.author | Bayrak, Coşkun | |
| dc.contributor.author | Şeker, Remzi | |
| dc.contributor.author | Topaloğlu, Ümit | |
| dc.contributor.author | Samadi, Nasrola | |
| dc.contributor.author | Tek, Süleyman | |
| dc.contributor.author | Jiang, Bian | |
| dc.contributor.author | Zhou, GuangXu | |
| dc.contributor.author | Wang, Xiaoran | |
| dc.contributor.authorID | 141152 | tr_TR |
| dc.contributor.authorID | 6194 | tr_TR |
| dc.date.accessioned | 2018-07-30T09:55:45Z | |
| dc.date.available | 2018-07-30T09:55:45Z | |
| dc.date.issued | 2009 | |
| dc.identifier.isbn | 978-1-4244-2793-2 | |
| dc.identifier.issn | 1062-922X | |
| dc.identifier.scopus | 2-s2.0-74849107916 | |
| dc.identifier.uri | https://doi.org/10.1109/ICSMC.2009.5346329 | |
| dc.identifier.uri | https://hdl.handle.net/11413/2412 | |
| dc.language.iso | en | |
| dc.publisher | IEEE, 345 E 47th St, New York, Ny 10017 USA | |
| dc.relation | 2009 IEEE International Conference on Systems, Man and Cybernetics (Smc 2009), Vols 1-9 | tr_TR |
| dc.subject | Access Control | tr_TR |
| dc.subject | Cryptographic Keys | tr_TR |
| dc.subject | Cryptography | tr_TR |
| dc.subject | Dynamic Key Management | tr_TR |
| dc.subject | Hierarchical Access Control | tr_TR |
| dc.subject | Lattice | tr_TR |
| dc.subject | Rekeying | tr_TR |
| dc.subject | Key Assignment Scheme | tr_TR |
| dc.subject | Management Schemes | tr_TR |
| dc.subject | User Hierarchy | tr_TR |
| dc.subject | Cryptography | tr_TR |
| dc.subject | Algorithm | tr_TR |
| dc.title | Design of a lattice-based access control scheme | tr_TR |
| dc.type | Article | |
| dspace.entity.type | Publication | |
| local.indexed.at | Scopus |
Files
License bundle
1 - 1 of 1
Loading...
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description:
