{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T07:38:00Z","timestamp":1729669080087,"version":"3.28.0"},"reference-count":30,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,1]]},"DOI":"10.1109\/comsnets.2013.6465571","type":"proceedings-article","created":{"date-parts":[[2013,3,1]],"date-time":"2013-03-01T08:29:54Z","timestamp":1362126594000},"page":"1-9","source":"Crossref","is-referenced-by-count":3,"title":["LHSC: An effective dynamic key management scheme for linear hierarchical access control"],"prefix":"10.1109","author":[{"given":"Vanga","family":"Odelu","sequence":"first","affiliation":[]},{"given":"Ashok Kumar","family":"Das","sequence":"additional","affiliation":[]},{"given":"Adrijit","family":"Goswami","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"581","article-title":"A hierarchical key management scheme in role-based access control","volume":"5","author":"liu","year":"2010","journal-title":"Proceedings of International Conference on Computer Design and Applications (ICCDA"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/ITCS.2009.119"},{"key":"18","first-page":"68","article-title":"A novel key management scheme for dynamic access control in a hierarchy","volume":"11","author":"tzeng","year":"2011","journal-title":"International Journal of Network Security"},{"key":"15","doi-asserted-by":"crossref","first-page":"124","DOI":"10.1007\/3-540-57332-1_10","article-title":"Sibling intractable function families and their applications (extended abstract)","volume":"739","author":"zheng","year":"1993","journal-title":"Lecture Notes in Computer Science"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-4048(02)00211-0"},{"key":"13","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1007\/3-540-45600-7_42","article-title":"Chinese remainder theorem based hierarchical access control for secure group communication","author":"zou","year":"2001","journal-title":"Proceedings of the Third International Conference on Information and Communications Security (ICICS'01"},{"journal-title":"New Solutions to the Problem of Access Control in A Hierarchy","year":"1993","author":"zheng","key":"14"},{"key":"11","doi-asserted-by":"crossref","first-page":"312","DOI":"10.1109\/CIMSim.2011.63","article-title":"A novel secure key management module for hierarchical clustering wireless sensor networks","author":"gawdan","year":"2011","journal-title":"Proceedings of 2011 Third International Conference on Computational Intelligence Modelling and Simulation (CIMSiM"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/507711.507723"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/90.836475"},{"key":"20","doi-asserted-by":"crossref","first-page":"411","DOI":"10.1109\/TSE.1980.230489","article-title":"the design of a cryptography based secure file system","volume":"se 6","author":"gudes","year":"1980","journal-title":"IEEE Transactions on Software Engineering"},{"journal-title":"Advanced Encryption Standard","year":"2001","key":"22"},{"journal-title":"Secure Hash Standard","year":"1995","key":"23"},{"journal-title":"Cryptography and Network Security Principles and Practices","year":"2003","author":"stallings","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-012-9857-8"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34135-9_1"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-012-9920-5"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2012.04.036"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.02.006"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.05.072"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/357369.357372"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICITIS.2010.5689555"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2006.12.011"},{"key":"30","doi-asserted-by":"crossref","first-page":"190","DOI":"10.1145\/1102120.1102147","article-title":"Dynamic and efficient key management for access hierarchies","author":"atallah","year":"2005","journal-title":"Proceedings of of the 12th ACM Conference on Computer and Communications Security (CCS'05)"},{"key":"7","first-page":"405","article-title":"On some cryptographic solutions for access control in a tree hierarchy","author":"sandhu","year":"1987","journal-title":"Proc Fall Joint Computer Conf Exploring Technology Today and Tomorrow"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(88)90099-3"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1007\/s10916-011-9700-7"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2007.08.001"},{"key":"9","first-page":"298","article-title":"Dynamic key management in a user hierarchy","author":"he","year":"2008","journal-title":"2008 2nd International Conference on Anti-counterfeiting Security and Identification ASID"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1016\/j.cose.2004.08.004"}],"event":{"name":"2013 Fifth International Conference on Communication Systems and Networks (COMSNETS)","start":{"date-parts":[[2013,1,7]]},"location":"Bangalore, India","end":{"date-parts":[[2013,1,10]]}},"container-title":["2013 Fifth International Conference on Communication Systems and Networks (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6451320\/6465521\/06465571.pdf?arnumber=6465571","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,21]],"date-time":"2017-06-21T04:29:55Z","timestamp":1498019395000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6465571\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1]]},"references-count":30,"URL":"https:\/\/doi.org\/10.1109\/comsnets.2013.6465571","relation":{},"subject":[],"published":{"date-parts":[[2013,1]]}}}