Journal articles on the topic 'Hierarchical key assignment'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Hierarchical key assignment.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Li Lin, Yu, Chien Lung Hsu, and Yu Hao Chuang. "A Robust Time-Bound Hierarchical Key Assignment Scheme." International Journal of Future Computer and Communication 3, no. 5 (October 2014): 337–40. http://dx.doi.org/10.7763/ijfcc.2014.v3.322.
Full textLin, Chu-Hsing. "Hierarchical key assignment without public-key cryptography." Computers & Security 20, no. 7 (October 2001): 612–19. http://dx.doi.org/10.1016/s0167-4048(01)00711-8.
Full textZHU, Wen Tao, Robert H. DENG, Jianying ZHOU, and Feng BAO. "Time-Bound Hierarchical Key Assignment: An Overview." IEICE Transactions on Information and Systems E93-D, no. 5 (2010): 1044–52. http://dx.doi.org/10.1587/transinf.e93.d.1044.
Full textHung-Yu Chen. "Efficient time-bound hierarchical key assignment scheme." IEEE Transactions on Knowledge and Data Engineering 16, no. 10 (October 2004): 1301–4. http://dx.doi.org/10.1109/tkde.2004.59.
Full textZhigang, Zhang, Zhao Jing, and Xu Maozhi. "A model of hierarchical key assignment scheme." Wuhan University Journal of Natural Sciences 11, no. 6 (November 2006): 1597–600. http://dx.doi.org/10.1007/bf02831829.
Full textChien, Hung-Yu, and Jinn-Ke Jan. "New hierarchical assignment without Public Key cryptography." Computers & Security 22, no. 6 (September 2003): 523–26. http://dx.doi.org/10.1016/s0167-4048(03)00613-8.
Full textSantis, Alfredo De, Anna Lisa Ferrara, and Barbara Masucci. "Efficient provably-secure hierarchical key assignment schemes." Theoretical Computer Science 412, no. 41 (September 2011): 5684–99. http://dx.doi.org/10.1016/j.tcs.2011.06.024.
Full textYeh, Jyh-haw. "Enforcing non-hierarchical access policies by hierarchical key assignment schemes." Information Processing Letters 110, no. 2 (December 2009): 46–49. http://dx.doi.org/10.1016/j.ipl.2009.10.005.
Full textCastiglione, Arcangelo, Alfredo De Santis, and Barbara Masucci. "Key Indistinguishability versus Strong Key Indistinguishability for Hierarchical Key Assignment Schemes." IEEE Transactions on Dependable and Secure Computing 13, no. 4 (July 1, 2016): 451–60. http://dx.doi.org/10.1109/tdsc.2015.2413415.
Full textAteniese, Giuseppe, Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci. "Provably-Secure Time-Bound Hierarchical Key Assignment Schemes." Journal of Cryptology 25, no. 2 (November 23, 2010): 243–70. http://dx.doi.org/10.1007/s00145-010-9094-6.
Full textAteniese, Giuseppe, Alfredo De Santis, Anna Lisa Ferrara, and Barbara Masucci. "A note on time-bound hierarchical key assignment schemes." Information Processing Letters 113, no. 5-6 (March 2013): 151–55. http://dx.doi.org/10.1016/j.ipl.2013.01.006.
Full textLi, Xiaoyu, Min Ye, Jiahui Chen, Jianhui Chen, and Yeh-Cheng Chen. "A Novel Hierarchical Key Assignment Scheme for Data Access Control in IoT." Security and Communication Networks 2021 (December 6, 2021): 1–12. http://dx.doi.org/10.1155/2021/6174506.
Full textHe, Bing-Zhe, Chien-Ming Chen, Tsu-Yang Wu, and Hung-Min Sun. "An Efficient Solution for Hierarchical Access Control Problem in Cloud Environment." Mathematical Problems in Engineering 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/569397.
Full textYi, X. "Security of Chien's efficient time-bound hierarchical key assignment scheme." IEEE Transactions on Knowledge and Data Engineering 17, no. 9 (September 2005): 1298–99. http://dx.doi.org/10.1109/tkde.2005.152.
Full textYeh, Jyh-haw. "A secure time-bound hierarchical key assignment scheme based on RSA public key cryptosystem." Information Processing Letters 105, no. 4 (February 2008): 117–20. http://dx.doi.org/10.1016/j.ipl.2007.08.017.
Full textDe Santis, Alfredo, Anna Lisa Ferrara, and Barbara Masucci. "New constructions for provably-secure time-bound hierarchical key assignment schemes." Theoretical Computer Science 407, no. 1-3 (November 2008): 213–30. http://dx.doi.org/10.1016/j.tcs.2008.05.021.
Full textDESANTIS, A., A. FERRARA, and B. MASUCCI. "Enforcing the security of a time-bound hierarchical key assignment scheme." Information Sciences 176, no. 12 (June 22, 2006): 1684–94. http://dx.doi.org/10.1016/j.ins.2005.07.002.
Full textShyh-Yih Wang and Chi-Sung Laih. "Merging: An Efficient Solution for a Time-Bound Hierarchical Key Assignment Scheme." IEEE Transactions on Dependable and Secure Computing 3, no. 1 (January 2006): 91–100. http://dx.doi.org/10.1109/tdsc.2006.15.
Full textChunxiang Xu, Rang Zhou, and Wanpeng Li. "A New Efficient Key Assignment Scheme for Hierarchical Access Control with General Tree Structure." International Journal of Advancements in Computing Technology 5, no. 5 (March 15, 2013): 1223–31. http://dx.doi.org/10.4156/ijact.vol5.issue5.146.
Full textDeng, Zeng, and Mei. "Passenger Flow Pushing Assignment Method for an Urban Rail Network Based on Hierarchical Path and Line Decomposition." Sustainability 11, no. 22 (November 15, 2019): 6441. http://dx.doi.org/10.3390/su11226441.
Full textPatra, Ankit, Saurav Verma, Sahil Kumar, and Prof S. Keerthi. "A Higher-Level Security Scheme for Key Access ON Cloud Computing." International Journal for Research in Applied Science and Engineering Technology 10, no. 3 (March 31, 2022): 380–83. http://dx.doi.org/10.22214/ijraset.2022.40321.
Full textHAWKINS, ROGER, MONA ALTHOBAITI, and YI MA. "Eliminating grammatical function assignment from hierarchical models of speech production: Evidence from the conceptual accessibility of referents." Applied Psycholinguistics 35, no. 4 (December 10, 2012): 677–707. http://dx.doi.org/10.1017/s0142716412000549.
Full textZhu, Yikun, and Zhiling Du. "Research on the Key Technologies of Network Security-Oriented Situation Prediction." Scientific Programming 2021 (May 31, 2021): 1–10. http://dx.doi.org/10.1155/2021/5527746.
Full textCafaro, Massimo, Roberto Civino, and Barbara Masucci. "On the Equivalence of Two Security Notions for Hierarchical Key Assignment Schemes in the Unconditional Setting." IEEE Transactions on Dependable and Secure Computing 12, no. 4 (July 1, 2015): 485–90. http://dx.doi.org/10.1109/tdsc.2014.2355841.
Full textSchwartz, Odelia, Terrence J. Sejnowski, and Peter Dayan. "Soft Mixer Assignment in a Hierarchical Generative Model of Natural Scene Statistics." Neural Computation 18, no. 11 (November 2006): 2680–718. http://dx.doi.org/10.1162/neco.2006.18.11.2680.
Full textWang, Ya Ping, Jiang Hua Ge, Jun Peng Shao, and Zhi Qiang Li. "Research on Project Level Collaborative Design Process Oriented to Complex Product." Materials Science Forum 628-629 (August 2009): 37–42. http://dx.doi.org/10.4028/www.scientific.net/msf.628-629.37.
Full textWang, Zhujun, Cheng Chi, Mengyun Zhang, Xianyi Zeng, Pascal Bruniaux, Jianping Wang, and Yingmei Xing. "Data mining-based optimal assignment of apparel size for mass customization." Communications in Development and Assembling of Textile Products 1, no. 1 (August 10, 2020): 20–29. http://dx.doi.org/10.25367/cdatp.2020.1.p20-29.
Full textSchmidt, C., D. Piper, P. Putsche, M. Feucht, H. Witte, L. Leistritz, and K. Schiecke. "Assignment of Empirical Mode Decomposition Components and Its Application to Biomedical Signals." Methods of Information in Medicine 54, no. 05 (2015): 461–73. http://dx.doi.org/10.3414/me14-02-0024.
Full textWilliamsson, Anna, Andrea Eriksson, and Lotta Dellve. "Organization of change agents during care process redesign in Swedish health care." Journal of Hospital Administration 5, no. 3 (February 24, 2016): 20. http://dx.doi.org/10.5430/jha.v5n3p20.
Full textPitombeira-Neto, Anselmo, Carlos Loureiro, and Luis Carvalho. "Bayesian Inference on Dynamic Linear Models of Day-to-Day Origin-Destination Flows in Transportation Networks." Urban Science 2, no. 4 (December 10, 2018): 117. http://dx.doi.org/10.3390/urbansci2040117.
Full textBadell, Daniel, Jesica de Armas, and Albert Julià. "Impact of Socioeconomic Environment on Home Social Care Service Demand and Dependent Users." International Journal of Environmental Research and Public Health 19, no. 4 (February 12, 2022): 2053. http://dx.doi.org/10.3390/ijerph19042053.
Full textMakasheva, A. M. "Cluster-associated viscosity model and methods for determining its parameters." Kompleksnoe Ispolʹzovanie Mineralʹnogo syrʹâ/Complex Use of Mineral Resources/Mineraldik Shikisattardy Keshendi Paidalanu 2, no. 313 (June 15, 2020): 27–37. http://dx.doi.org/10.31643/2020/6445.14.
Full textFekry, Reda, Wei Yao, Lin Cao, and Xin Shen. "Marker-Less UAV-LiDAR Strip Alignment in Plantation Forests Based on Topological Persistence Analysis of Clustered Canopy Cover." ISPRS International Journal of Geo-Information 10, no. 5 (April 29, 2021): 284. http://dx.doi.org/10.3390/ijgi10050284.
Full textVo, Henry Hiep, Siqing Fu, David S. Hong, Daniel D. Karp, Sarina Anne Anne Piha-Paul, Vivek Subbiah, Filip Janku, et al. "Initiative for Molecular Profiling and Advanced Cancer Therapy (IMPACT2): Challenges and Opportunities in Conducting an MD Anderson Randomized Study in Precision Oncology." Journal of Clinical Oncology 39, no. 15_suppl (May 20, 2021): 3140. http://dx.doi.org/10.1200/jco.2021.39.15_suppl.3140.
Full textBilsel, Mine, Taner Gökçen, Burcu Binici, Alper Isleyen, Christian Piechotta, Anita Cheng Kar-wai, Anatoliy Krylov, et al. "High polarity analyte(s) in aqueous media: determination of L-PFOA and L-PFOS in ground water." Metrologia 59, no. 1A (January 1, 2022): 08016. http://dx.doi.org/10.1088/0026-1394/59/1a/08016.
Full textKangas, Michael James, Christina L. Wilson, Raychelle M. Burks, Jordyn Atwater, Rachel M. Lukowicz, Billy Garver, Miles Mayer, Shana Havenridge, and Andrea E. Holmes. "An Improved Comparison of Chemometric Analyses for the Identification of Acids and Bases With Colorimetric Sensor Arrays." International Journal of Chemistry 10, no. 2 (April 25, 2018): 36. http://dx.doi.org/10.5539/ijc.v10n2p36.
Full textGeyer, Holly Lynn, Amylou C. Dueck, Robyn M. Emanuel, Jean-Jacques Kiladjian, Stefanie Slot, Sonja Zweegman, Peter Boekhorst, et al. "The Myelofibrosis Symptom Burden (MF-SB): An International Phenotypic Cluster Analysis of 329 Patients." Blood 120, no. 21 (November 16, 2012): 1731. http://dx.doi.org/10.1182/blood.v120.21.1731.1731.
Full textBocciardi, Federica, Andrea Caputo, Chiara Fregonese, Viviana Langher, and Riccardo Sartori. "Career adaptability as a strategic competence for career development." European Journal of Training and Development 41, no. 1 (January 3, 2017): 67–82. http://dx.doi.org/10.1108/ejtd-07-2016-0049.
Full textDeAngelo, Daniel J., Harry P. Erba, Brian A. Jonas, Michael E. O'Dwyer, Paula Marlton, Gerwin Huls, Jane L. Liesveld, et al. "A Double-Blind, Placebo-Controlled, Phase 3 Registration Trial to Evaluate the Efficacy of Uproleselan (GMI-1271) with Standard Salvage Chemotherapy in Patients with Relapsed/Refractory (R/R) Acute Myeloid Leukemia." Blood 134, Supplement_1 (November 13, 2019): 2650. http://dx.doi.org/10.1182/blood-2019-123816.
Full textPlugatar, Yu V., N. B. Ermakov, P. V. Krestov, N. V. Matveyeva, V. B. Martynenko, V. B. Golub, V. Yu Neshataeva, et al. "The concept of vegetation classification of Russia as an image of contemporary tasks of phytocoenology." Vegetation of Russia, no. 38 (July 2020): 3–12. http://dx.doi.org/10.31111/vegrus/2020.38.3.
Full textGuo, Zhen, Xianjiang Li, Xiuqin Li, Qinghe Zhang, Hongmei Li, Clare Ho, Tony CH Lam, et al. "Supplementary comparison study - fipronil-sulfone in chicken egg powder (APMP.QM-S16)." Metrologia 59, no. 1A (January 1, 2022): 08009. http://dx.doi.org/10.1088/0026-1394/59/1a/08009.
Full textKandele, Suyash, and Souradyuti Paul. "Key Assignment Scheme with Authenticated Encryption." IACR Transactions on Symmetric Cryptology, December 13, 2018, 150–96. http://dx.doi.org/10.46586/tosc.v2018.i4.150-196.
Full textPijnenburg, Jeroen, and Bertram Poettering. "Key Assignment Schemes with Authenticated Encryption, revisited." IACR Transactions on Symmetric Cryptology, July 24, 2020, 40–67. http://dx.doi.org/10.46586/tosc.v2020.i2.40-67.
Full textWakude, Sudhir, and Vivekanand Reddy. "Hierarchical Access Control in Cloud Computing." International Journal of Research Publication and Reviews, August 19, 2022, 1184–93. http://dx.doi.org/10.55248/gengpi.2022.3.8.42.
Full textPareek, Gaurav, and B. R. Purushothama. "Extended hierarchical key assignment scheme (E-HKAS): how to efficiently enforce explicit policy exceptions in dynamic hierarchies." Sādhanā 44, no. 12 (November 16, 2019). http://dx.doi.org/10.1007/s12046-019-1216-8.
Full textZawadzka, Anna. "Pułapki niehierarchiczności." interalia: a journal of queer studies, 2012. http://dx.doi.org/10.51897/interalia/aqiw7057.
Full textSoleymani, Dariush Moahammad, Mohammad Reza Gholami, Giovanni Del Galdo, Jens Mueckenheim, and Andreas Mitschele-Thiel. "Open sub-granting radio resources in overlay D2D-based V2V communications." EURASIP Journal on Wireless Communications and Networking 2022, no. 1 (May 16, 2022). http://dx.doi.org/10.1186/s13638-022-02128-0.
Full text"Critical Success Factors for Lean Implementation Within Sme’s in South India." International Journal of Recent Technology and Engineering 8, no. 2S8 (September 17, 2019): 922–27. http://dx.doi.org/10.35940/ijrte.b1176.0882s819.
Full textBustos-Korts, Daniela, Martin P. Boer, Jamie Layton, Anke Gehringer, Tom Tang, Ron Wehrens, Charlie Messina, Abelardo J. de la Vega, and Fred A. van Eeuwijk. "Identification of environment types and adaptation zones with self-organizing maps; applications to sunflower multi-environment data in Europe." Theoretical and Applied Genetics, May 7, 2022. http://dx.doi.org/10.1007/s00122-022-04098-9.
Full textDi Toma, Paolo, and Stefano Ghinoi. "Overcoming hierarchy in business model innovation: an actor-oriented approach." European Journal of Innovation Management ahead-of-print, ahead-of-print (June 23, 2020). http://dx.doi.org/10.1108/ejim-10-2019-0307.
Full text