SECURE ACCESS-CONTROL AND MAC-BASED SIGNATURES

被引:0
|
作者
BEKER, H
机构
来源
INFORMATION AGE | 1988年 / 10卷 / 01期
关键词
D O I
暂无
中图分类号
G25 [图书馆学、图书馆事业]; G35 [情报学、情报工作];
学科分类号
1205 ; 120501 ;
摘要
引用
收藏
页码:20 / 22
页数:3
相关论文
共 50 条
  • [1] SMMAP: Secure MAC-based Mutual Authentication Protocol for IoV
    Sikarwar, Himani
    Das, Debasis
    PROCEEDINGS OF THE 24TH INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING AND NETWORKING, ICDCN 2023, 2023, : 330 - 335
  • [2] SECURE USER ACCESS-CONTROL FOR PUBLIC NETWORKS
    LEE, PJ
    LECTURE NOTES IN COMPUTER SCIENCE, 1990, 453 : 46 - 57
  • [3] A Homomorphic MAC-based Secure Data Aggregation Scheme for Wireless Sensor Networks
    Liu, Yun
    Li, Chaoran
    Zhang, Jing
    Liu, Qing
    JOURNAL OF INTERNET TECHNOLOGY, 2018, 19 (07): : 2069 - 2077
  • [4] A Secure and Efficient Access-Control Scheme Based on Blockchain and CP-ABE for UAV Swarm
    Han, Pengbin
    Sui, Aina
    Wu, Jiang
    DRONES, 2025, 9 (02)
  • [5] ARCHITECTURAL ACCESS-CONTROL
    KNOPP, SL
    PROGRESSIVE ARCHITECTURE, 1988, 69 (04): : 146 - &
  • [6] ACCESS-CONTROL SOFTWARE
    FRIEDMAN, M
    INFORMATION AGE, 1988, 10 (03): : 157 - 161
  • [7] A TDMA BASED ACCESS-CONTROL SCHEME FOR APONS
    ANGELOPOULOS, JD
    VENIERIS, IS
    STASSINOPOULOS, GI
    JOURNAL OF LIGHTWAVE TECHNOLOGY, 1993, 11 (5-6) : 1095 - 1103
  • [8] LATTICE-BASED ACCESS-CONTROL MODELS
    SANDHU, RS
    COMPUTER, 1993, 26 (11) : 9 - 19
  • [9] Cognitive Adaptive Access-Control System for a Secure Locator/Identifier Separation Context
    Cao, Yuanlong
    Guan, Jianfeng
    Xu, Changqiao
    Quan, Wei
    Zhang, Hongke
    2014 IEEE 13TH INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM), 2014, : 361 - 369
  • [10] DACS: DHT-Based Distributed Access-Control System for a Secure Locator/Identifier Separation Network
    Wang, Kai
    JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (07): : 1413 - 1421