Login / Signup
Cryptanalyses and improvements of two cryptographic key assignment schemes for dynamic access control in a user hierarchy.
Chien-Lung Hsu
Tzong-Sun Wu
Published in:
Comput. Secur. (2003)
Keyphrases
</>
user experience
user preferences
dynamic access control
neural network
user input
user feedback
user defined
user queries
user interaction
information retrieval systems
end users
mobile devices
recommender systems
similarity measure
human users
user requirements
concept hierarchy
database systems
social networks