𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Two integrated schemes of user authentication and access control in a distributed computer network

✍ Scribed by Jan, J.-K.; Tseng, Y.-M.


Book ID
114448365
Publisher
The Institution of Electrical Engineers
Year
1998
Tongue
English
Weight
639 KB
Volume
145
Category
Article
ISSN
1350-2387

No coin nor oath required. For personal study only.


πŸ“œ SIMILAR VOLUMES


Cryptanalyses and improvements of two cr
✍ Chien-Lung Hsu; Tzong-Sun Wu πŸ“‚ Article πŸ“… 2003 πŸ› Elsevier Science 🌐 English βš– 152 KB

## Recently, Wu and Chang and Shen and Chen separately proposed a cryptographic key assignment scheme for solving access control problem in a partially ordered user hierarchy. However, this paper will show the security leaks inherent in both schemes based on polynomial interpolations. That is, the u