{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,2]],"date-time":"2022-04-02T23:42:20Z","timestamp":1648942940310},"reference-count":15,"publisher":"Informa UK Limited","issue":"4","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["International Journal of Computer Mathematics"],"published-print":{"date-parts":[[2000,1]]},"DOI":"10.1080\/00207160008804909","type":"journal-article","created":{"date-parts":[[2007,6,26]],"date-time":"2007-06-26T00:24:14Z","timestamp":1182817454000},"page":"463-468","source":"Crossref","is-referenced-by-count":9,"title":["An asymmetric cryptographuic key assignment scheme for access control in totally-ordered hierarchies<sup>\u2217<\/sup>"],"prefix":"10.1080","volume":"73","author":[{"given":"Min-Shiang","family":"Hwang","sequence":"first","affiliation":[]}],"member":"301","reference":[{"key":"CIT0001","unstructured":"Aid, S.G and Taylor, P.D. Cryptographic solution to a multilevel security problem. Proceedings of Crypto'82. pp.237\u2013249."},{"key":"CIT0002","volume":"1","author":"Aid S.G","year":"1983","journal-title":"ACM Transactions on Computer Systems"},{"key":"CIT0003","doi-asserted-by":"publisher","DOI":"10.1016\/0306-4379(92)90015-F"},{"key":"CIT0004","volume-title":"Cryptography and data security","author":"Denning D.E.R","year":"1982"},{"key":"CIT0005","doi-asserted-by":"crossref","unstructured":"Diffie, W. The first ten years of public-key cryptography. Proceedings of the IEEE. Vol. 76, pp.560\u2013577.","DOI":"10.1109\/5.4442"},{"key":"CIT0006","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"CIT0007","doi-asserted-by":"publisher","DOI":"10.1016\/0167-4048(90)90132-D"},{"key":"CIT0008","doi-asserted-by":"publisher","DOI":"10.1049\/el:19931400"},{"key":"CIT0009","volume":"29","author":"Hwang M.S","year":"1997","journal-title":"Mathematical and Computer Modelling"},{"key":"CIT0010","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1985.1676635"},{"key":"CIT0011","doi-asserted-by":"crossref","unstructured":"Moore, J.H. Protocol failures in cryptosystems. Proceedings of IEEE. Vol. 76, pp.594\u2013602.","DOI":"10.1109\/5.4444"},{"key":"CIT0012","volume-title":"Digitalized signatures and public-key functions as intractable as factorization","author":"Rabin M.O","year":"1979"},{"key":"CIT0013","doi-asserted-by":"publisher","DOI":"10.1145\/359340.359342"},{"key":"CIT0014","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(88)90099-3"},{"key":"CIT0015","unstructured":"Yang, W.P, Hwang, M.S and Lee, C.L. A cryptographic key assignment scheme for access control in partially-ordered hierarchies. Proceedings of the Third Conference on Information Security. pp.2.1\u20132.13."}],"container-title":["International Journal of Computer Mathematics"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/www.tandfonline.com\/doi\/pdf\/10.1080\/00207160008804909","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,4,29]],"date-time":"2019-04-29T19:53:16Z","timestamp":1556567596000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.tandfonline.com\/doi\/abs\/10.1080\/00207160008804909"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,1]]},"references-count":15,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2000,1]]}},"alternative-id":["10.1080\/00207160008804909"],"URL":"https:\/\/doi.org\/10.1080\/00207160008804909","relation":{},"ISSN":["0020-7160","1029-0265"],"issn-type":[{"value":"0020-7160","type":"print"},{"value":"1029-0265","type":"electronic"}],"subject":[],"published":{"date-parts":[[2000,1]]}}}