Cryptanalysis and improvement of an access control in user hierarchy based on elliptic curve cryptosystem.
Ashok Kumar DasNayan Ranjan PaulLaxminath TripathyPublished in: Inf. Sci. (2012)
Keyphrases
- access control
- elliptic curve
- scalar multiplication
- data security
- security policies
- dynamic access control
- key management
- efficient computation
- digital signature
- access control models
- security model
- key distribution
- role based access control
- diffie hellman
- security mechanisms
- access control systems
- web services
- access rights
- power analysis
- access control mechanism
- security requirements
- access control policies
- user preferences