네트워크 스토리지에서 비대칭키 방식의 시 분할 권한 권리 (ATPM)
Vol. 15, No. 3, pp. 31-42,
6월.
2005
10.13089/JKIISC.2005.15.3.31,
Full Text:
Keywords: privilege Management, Network Storage, Hierarchical ID-Based Encryption Scheme, ID-Based Signature Scheme
Abstract Statistics
Cite this article


Keywords: privilege Management, Network Storage, Hierarchical ID-Based Encryption Scheme, ID-Based Signature Scheme
Abstract Statistics
Cite this article
[IEEE Style]
E. Kim, H. Yoon, J. Cheon, "Asymmetric Temporal Privilege Management on Untrusted Storage Server," Journal of The Korea Institute of Information Security and Cryptology, vol. 15, no. 3, pp. 31-42, 2005. DOI: 10.13089/JKIISC.2005.15.3.31.
[ACM Style]
Euh-Mi Kim, Hyo-Jin Yoon, and Jung-Hee Cheon. 2005. Asymmetric Temporal Privilege Management on Untrusted Storage Server. Journal of The Korea Institute of Information Security and Cryptology, 15, 3, (2005), 31-42. DOI: 10.13089/JKIISC.2005.15.3.31.