{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,22]],"date-time":"2025-03-22T04:10:35Z","timestamp":1742616635983,"version":"3.40.2"},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642280726"},{"type":"electronic","value":"9783642280733"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28073-3_15","type":"book-chapter","created":{"date-parts":[[2012,2,21]],"date-time":"2012-02-21T06:11:19Z","timestamp":1329804679000},"page":"166-176","source":"Crossref","is-referenced-by-count":1,"title":["Detecting Flaws in Dynamic Hierarchical Key Management Schemes Using Specification Animation"],"prefix":"10.1007","author":[{"given":"Anil","family":"Mundra","sequence":"first","affiliation":[]},{"given":"Anish","family":"Mathuria","sequence":"additional","affiliation":[]},{"given":"Manik Lal","family":"Das","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"3","key":"15_CR1","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1145\/357369.357372","volume":"1","author":"S.G. Akl","year":"1983","unstructured":"Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Trans. Comput. Syst.\u00a01(3), 239\u2013248 (1983)","journal-title":"ACM Trans. Comput. Syst."},{"issue":"3","key":"15_CR2","doi-asserted-by":"publisher","first-page":"289","DOI":"10.3233\/JCS-2008-16303","volume":"16","author":"A.V.D.M. Kayem","year":"2008","unstructured":"Kayem, A.V.D.M., Akl, S.G., Martin, P.: On replacing cryptographic keys in hierarchical key management systems. Journal of Computer Security\u00a016(3), 289\u2013309 (2008)","journal-title":"Journal of Computer Security"},{"issue":"15","key":"15_CR3","doi-asserted-by":"publisher","first-page":"1381","DOI":"10.1016\/S0140-3664(97)00100-X","volume":"20","author":"C.-H. Lin","year":"1997","unstructured":"Lin, C.-H.: Dynamic key management schemes for access control in a hierarchy. Computer Communications\u00a020(15), 1381\u20131385 (1997)","journal-title":"Computer Communications"},{"issue":"7","key":"15_CR4","doi-asserted-by":"publisher","first-page":"612","DOI":"10.1016\/S0167-4048(01)00711-8","volume":"20","author":"C.-H. Lin","year":"2001","unstructured":"Lin, C.-H.: Hierarchical key assignment without public-key cryptography. Computers & Security\u00a020(7), 612\u2013619 (2001)","journal-title":"Computers & Security"},{"issue":"4","key":"15_CR5","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1016\/j.ins.2010.09.033","volume":"181","author":"J.-W. Lo","year":"2011","unstructured":"Lo, J.-W., Hwang, M.-S., Liu, C.-H.: An efficient key assignment scheme for access control in a large leaf class hierarchy. Inf. Sci.\u00a0181(4), 917\u2013925 (2011)","journal-title":"Inf. Sci."},{"issue":"2","key":"15_CR6","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1016\/S0167-4048(02)00211-0","volume":"21","author":"V.R.L. Shen","year":"2002","unstructured":"Shen, V.R.L., Chen, T.-S.: A novel key management scheme based on discrete logarithms and polynomial interpolations. Computers & Security\u00a021(2), 164\u2013171 (2002)","journal-title":"Computers & Security"},{"issue":"1","key":"15_CR7","first-page":"25","volume":"16","author":"T.-C. Wu","year":"2001","unstructured":"Wu, T.-C., Chang, C.-C.: Cryptographic key assignment scheme for hierarchical access control. Comput. Syst. Sci. Eng.\u00a016(1), 25\u201328 (2001)","journal-title":"Comput. Syst. Sci. Eng."},{"issue":"8","key":"15_CR8","doi-asserted-by":"publisher","first-page":"659","DOI":"10.1016\/j.cose.2004.08.004","volume":"23","author":"C. Yang","year":"2004","unstructured":"Yang, C., Li, C.: Access control in a hierarchy using one-way hash functions. Computers & Security\u00a023(8), 659\u2013664 (2004)","journal-title":"Computers & Security"},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Atallah, M.J., Frikken, K.B., Blanton, M.: Dynamic and efficient key management for access hierarchies. In: Atluri, V., Meadows, C., Juels, A. (eds.) ACM Conference on Computer and Communications Security, pp. 190\u2013202. ACM (2005)","DOI":"10.1145\/1102120.1102147"},{"issue":"2","key":"15_CR10","doi-asserted-by":"publisher","first-page":"274","DOI":"10.1109\/TSE.1987.233151","volume":"13","author":"J.K. Millen","year":"1987","unstructured":"Millen, J.K., Clark, S.C., Freedman, S.B.: The interrogator: Protocol security analysis. IEEE Trans. Software Eng.\u00a013(2), 274\u2013288 (1987)","journal-title":"IEEE Trans. Software Eng."},{"issue":"1","key":"15_CR11","doi-asserted-by":"publisher","first-page":"75","DOI":"10.1016\/0167-4048(92)90222-D","volume":"11","author":"D. Longley","year":"1992","unstructured":"Longley, D., Rigby, S.: An automatic search for security flaws in key management schemes. Computers & Security\u00a011(1), 75\u201389 (1992)","journal-title":"Computers & Security"},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Blanchet, B.: An efficient cryptographic protocol verifier based on prolog rules. In: CSFW, pp. 82\u201396. IEEE Computer Society (2001)","DOI":"10.1109\/CSFW.2001.930138"},{"key":"15_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"209","DOI":"10.1007\/3-540-44456-4_16","volume-title":"Information Security","author":"C. Boyd","year":"2000","unstructured":"Boyd, C., Kearney, P.: Exploring Fair Exchange Protocols Using Specification Animation. In: Pieprzyk, J., Okamoto, E., Seberry, J. (eds.) ISW 2000. LNCS, vol.\u00a01975, pp. 209\u2013223. Springer, Heidelberg (2000)"},{"key":"15_CR14","unstructured":"Tang, S.: Efficient key assignment for hierarchical access control using one-way hash function. In: Proceedings of the 10th WSEAS International Conference on Computers, ICCOMP 2006, Stevens Point, Wisconsin, USA, pp. 350\u2013354 (2006)"},{"issue":"1","key":"15_CR15","doi-asserted-by":"publisher","first-page":"339","DOI":"10.1016\/j.amc.2003.12.113","volume":"162","author":"T.-S. Chen","year":"2005","unstructured":"Chen, T.-S., Huang, J.-Y.: A novel key management scheme for dynamic access control in a user hierarchy. Applied Mathematics and Computation\u00a0162(1), 339\u2013351 (2005)","journal-title":"Applied Mathematics and Computation"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"He, Z.H., Li, Y.-S.: Dynamic key management in a user hierarchy. In: 2nd International Conference on Anti-counterfeiting, Security and Identification, ASID 2008, pp. 298\u2013300 (August 2008)","DOI":"10.1109\/IWASID.2008.4688404"},{"key":"15_CR17","doi-asserted-by":"crossref","unstructured":"Crampton, J., Martin, K.M., Wild, P.R.: On key assignment for hierarchical access control. In: CSFW, pp. 98\u2013111. IEEE Computer Society (2006)","DOI":"10.1109\/CSFW.2006.20"}],"container-title":["Lecture Notes in Computer Science","Distributed Computing and Internet Technology"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28073-3_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,21]],"date-time":"2025-03-21T10:20:06Z","timestamp":1742552406000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-28073-3_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642280726","9783642280733"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28073-3_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}