{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,6]],"date-time":"2024-08-06T02:07:15Z","timestamp":1722910035801},"reference-count":10,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/aina.2004.1283750","type":"proceedings-article","created":{"date-parts":[[2004,6,10]],"date-time":"2004-06-10T10:19:45Z","timestamp":1086862785000},"page":"31-34","source":"Crossref","is-referenced-by-count":13,"title":["Secret sharing with access structures in a hierarchy"],"prefix":"10.1109","volume":"2","author":[{"family":"Chin-Chen Chang","sequence":"first","affiliation":[]},{"family":"Chu-Hsing Lin","sequence":"additional","affiliation":[]},{"family":"Wei Lee","sequence":"additional","affiliation":[]},{"family":"Pai-Cheng Hwang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0028464"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-34799-2_3"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1978.1055817"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1049\/ip-cdt:19971665"},{"key":"7","doi-asserted-by":"crossref","first-page":"1381","DOI":"10.1016\/S0140-3664(97)00100-X","article-title":"Dynamic key management schemes for access control a hierarchy","author":"lin","year":"1997","journal-title":"Computer Communications"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1007\/BF00125203"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1976.1055638"},{"key":"4","first-page":"59","author":"schneier","year":"1994","journal-title":"Applied Cryptography Protocols Algorithms and Source Code in C"},{"key":"9","first-page":"149","article-title":"A generalized secret sharing scheme with cheater detection","author":"lin","year":"1991","journal-title":"Proc Asiacrypt 91"},{"key":"8","first-page":"357","article-title":"A proposal of secure efficient dynamic hierarchical key management structure","author":"cho","year":"2001","journal-title":"The Second Workshop on Information Security Application"}],"event":{"name":"18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004.","location":"Fukuoka, Japan"},"container-title":["18th International Conference on Advanced Information Networking and Applications, 2004. AINA 2004."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/9028\/28653\/01283750.pdf?arnumber=1283750","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T03:56:34Z","timestamp":1497585394000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1283750\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":10,"URL":"https:\/\/doi.org\/10.1109\/aina.2004.1283750","relation":{},"subject":[]}}