This paper presents a Criterion-Based Role-Based Access Control model in which secure permissions (SP), secure operations (SOp), secure objects (SOb), and secure users (SU) are in...
In a hierarchical structure, a user in a security class has access to information items of another class if and only if the former class is a predecessor of latter. Based upon cry...
Deniable authentication protocol is different from traditional authentication protocol in that the intended receiver can authenticate the source of a given message, but cannot pr...
In order to reduce key sizes and bandwidth, several LFSRbased (linear feedback shift register) public key cryptosystems and signature schemes have been proposed. Digital signature...
Traitor tracing schemes constitute a very useful tool against piracy in the context of digital content broadcast. In such multi-recipient encryption schemes, the data-suppliers ca...