Login / Signup
Unconditionally Secure Access Control Encryption.
Cheuk Ting Li
Sherman S. M. Chow
Published in:
ISIT (2023)
Keyphrases
</>
access control
digital rights management
data security
data protection
data confidentiality
security requirements
security properties
security mechanisms
identity management
access control mechanism
security architecture
data encryption
unauthorized access
security analysis
fine grained
security model
xml access control
security policies
key management
encryption scheme
rbac model
dynamic access control
protection schemes
database security
access control models
role based access control
access control policies
security management
ad hoc networks
diffie hellman
encryption algorithm
authentication and access control