Publication: Design of a lattice-based access control scheme
dc.contributor.author | Demirer, Rüştü Murat | |
dc.contributor.author | Chiang, Chia-Chu | |
dc.contributor.author | Bayrak, Coşkun | |
dc.contributor.author | Şeker, Remzi | |
dc.contributor.author | Topaloğlu, Ümit | |
dc.contributor.author | Samadi, Nasrola | |
dc.contributor.author | Tek, Süleyman | |
dc.contributor.author | Jiang, Bian | |
dc.contributor.author | Zhou, GuangXu | |
dc.contributor.author | Wang, Xiaoran | |
dc.contributor.authorID | 141152 | tr_TR |
dc.contributor.authorID | 6194 | tr_TR |
dc.date.accessioned | 2018-07-30T09:55:45Z | |
dc.date.available | 2018-07-30T09:55:45Z | |
dc.date.issued | 2009 | |
dc.identifier.isbn | 978-1-4244-2793-2 | |
dc.identifier.issn | 1062-922X | |
dc.identifier.scopus | 2-s2.0-74849107916 | |
dc.identifier.uri | https://doi.org/10.1109/ICSMC.2009.5346329 | |
dc.identifier.uri | https://hdl.handle.net/11413/2412 | |
dc.language.iso | en_US | tr_TR |
dc.publisher | IEEE, 345 E 47th St, New York, Ny 10017 USA | tr_TR |
dc.relation | 2009 IEEE International Conference on Systems, Man and Cybernetics (Smc 2009), Vols 1-9 | tr_TR |
dc.subject | Access Control | tr_TR |
dc.subject | Cryptographic Keys | tr_TR |
dc.subject | Cryptography | tr_TR |
dc.subject | Dynamic Key Management | tr_TR |
dc.subject | Hierarchical Access Control | tr_TR |
dc.subject | Lattice | tr_TR |
dc.subject | Rekeying | tr_TR |
dc.subject | Key Assignment Scheme | tr_TR |
dc.subject | Management Schemes | tr_TR |
dc.subject | User Hierarchy | tr_TR |
dc.subject | Cryptography | tr_TR |
dc.subject | Algorithm | tr_TR |
dc.title | Design of a lattice-based access control scheme | tr_TR |
dc.type | Article | tr_TR |
dspace.entity.type | Publication | |
local.indexed.at | SCOPUS |
Files
License bundle
1 - 1 of 1
No Thumbnail Available
- Name:
- license.txt
- Size:
- 1.71 KB
- Format:
- Item-specific license agreed upon to submission
- Description: