{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T09:42:54Z","timestamp":1725702174474},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642341342"},{"type":"electronic","value":"9783642341359"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34135-9_1","type":"book-chapter","created":{"date-parts":[[2012,9,10]],"date-time":"2012-09-10T12:08:15Z","timestamp":1347278895000},"page":"1-10","source":"Crossref","is-referenced-by-count":3,"title":["A Novel Key Management Mechanism for Dynamic Hierarchical Access Control Based on Linear Polynomials"],"prefix":"10.1007","author":[{"given":"Vanga","family":"Odelu","sequence":"first","affiliation":[]},{"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Adrijit","family":"Goswami","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","unstructured":"Advanced Encryption Standard: FIPS PUB 197, National Institute of Standards and Technology (NIST), U.S. Department of Commerce (November 2001), \n                    \n                      http:\/\/csrc.nist.gov\/publications\/fips\/fips197\/fips-197.pdf"},{"issue":"3","key":"1_CR2","doi-asserted-by":"publisher","first-page":"239","DOI":"10.1145\/357369.357372","volume":"1","author":"S.G. Akl","year":"1983","unstructured":"Akl, S.G., Taylor, P.D.: Cryptographic solution to a problem of access control in a hierarchy. ACM Transactions on Computer Systems (TOCS)\u00a01(3), 239\u2013248 (1983)","journal-title":"ACM Transactions on Computer Systems (TOCS)"},{"issue":"3","key":"1_CR3","doi-asserted-by":"crossref","first-page":"198","DOI":"10.1145\/1455526.1455531","volume":"12","author":"M. Atallah","year":"2009","unstructured":"Atallah, M., Blanton, M., Fazio, N., Frikken, K.: Dynamic and Efficient Key Management for Access Hierarchies. ACM Trans. Inf. Syst. Secur. 12(3), Article 18, 198\u2013208 (2009)","journal-title":"ACM Trans. Inf. Syst. Secur."},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Atallah, M., Frikken, K., Blanton, M.: Dynamic and efficient key management for access hierarchies. In: ACM Conference on Computer and Communications Security (CCS 2005), pp. 190\u2013202 (2005)","DOI":"10.1145\/1102120.1102147"},{"issue":"1","key":"1_CR5","doi-asserted-by":"publisher","first-page":"230","DOI":"10.1016\/j.ins.2007.08.001","volume":"178","author":"Y.F. Chung","year":"2008","unstructured":"Chung, Y.F., Lee, H.H., Lai, F., Chen, T.S.: Access control in user hierarchy based on elliptic curve cryptosystem. Information Sciences\u00a0178(1), 230\u2013243 (2008)","journal-title":"Information Sciences"},{"key":"1_CR6","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.ins.2012.04.036","volume":"209","author":"A.K. Das","year":"2012","unstructured":"Das, A.K., Paul, N.R., Tripathy, L.: Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem. Information Sciences\u00a0209, 80\u201392 (2012)","journal-title":"Information Sciences"},{"issue":"8","key":"1_CR7","doi-asserted-by":"publisher","first-page":"1161","DOI":"10.1016\/j.jss.2006.01.018","volume":"79","author":"F.G. Jeng","year":"2006","unstructured":"Jeng, F.G., Wang, C.M.: An efficient key-management scheme for hierarchical access control based on elliptic curve cryptosystem. Journal of Systems and Software\u00a079(8), 1161\u20131167 (2006)","journal-title":"Journal of Systems and Software"},{"issue":"4","key":"1_CR8","doi-asserted-by":"publisher","first-page":"679","DOI":"10.1016\/j.jss.2010.11.926","volume":"84","author":"Y.L. Lin","year":"2011","unstructured":"Lin, Y.L., Hsu, C.L.: Secure key management scheme for dynamic hierarchical access control based on ECC. Journal of Systems and Software\u00a084(4), 679\u2013685 (2011)","journal-title":"Journal of Systems and Software"},{"issue":"4","key":"1_CR9","doi-asserted-by":"publisher","first-page":"917","DOI":"10.1016\/j.ins.2010.09.033","volume":"181","author":"J.W. Lo","year":"2011","unstructured":"Lo, J.W., Hwang, M.S., Liu, C.H.: An efficient key assignment scheme for access control in a large leaf class hierarchy. Information Sciences\u00a0181(4), 917\u2013925 (2011)","journal-title":"Information Sciences"},{"key":"1_CR10","doi-asserted-by":"crossref","unstructured":"Nikooghadam, M., Zakerolhosseini, A.: Secure Communication of Medical Information Using Mobile Agents. Journal of Medical Systems (2012), doi:10.1007\/s10916-012-9857-8","DOI":"10.1007\/s10916-012-9857-8"},{"issue":"10","key":"1_CR11","doi-asserted-by":"publisher","first-page":"1917","DOI":"10.1016\/j.jss.2010.05.072","volume":"83","author":"M. Nikooghadam","year":"2010","unstructured":"Nikooghadam, M., Zakerolhosseini, A., Moghaddam, M.E.: Efficient utilization of elliptic curve cryptosystem for hierarchical access control. Journal of Systems and Software\u00a083(10), 1917\u20131929 (2010)","journal-title":"Journal of Systems and Software"},{"key":"1_CR12","unstructured":"Secure Hash Standard: FIPS PUB 180-1, National Institute of Standards and Technology (NIST), U.S. Department of Commerce (April 1995)"},{"key":"1_CR13","doi-asserted-by":"crossref","unstructured":"Wu, S., Chen, K.: An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System. Journal of Medical Systems (2011), doi:10.1007\/s10916-011-9700-7","DOI":"10.1007\/s10916-011-9700-7"}],"container-title":["Communications in Computer and Information Science","Recent Trends in Computer Networks and Distributed Systems Security"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34135-9_1.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T12:45:41Z","timestamp":1620132341000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34135-9_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642341342","9783642341359"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34135-9_1","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2012]]}}}