Location of Repository

Identifying diferent scenarios for group access control in distributed environments

By Joan Arnedo Moreno and Jordi Herrera Joancomartí

Abstract

Open Access Documen

Topics: Group access control, Distributed systems
Publisher: DEIC UAB - EIMT UOC
Year: 2006
OAI identifier: oai:openaccess.uoc.edu:10609/8744

Suggested articles

Preview

Citations

  1. (2003). Authentication and access control in p2p network. doi
  2. (2005). Byzantine fault tolerant public key authentication in peerto-peer systems. doi
  3. (1988). CCITT: The directory authentication framework. recommendation doi
  4. (2002). Coca: A secure distributed online certification authority. doi
  5. (2001). Efficient generation of shared rsa keys. doi
  6. (1996). Handbook of Applied Cryptography. doi
  7. (2003). J.P.: Self-organized public-key management for mobile ad hoc networks. doi
  8. (2000). Key Agreement in Dynamic Peer Groups. In: doi
  9. (2004). Models of authentications in ad hoc networks and their related network properties. doi
  10. Pgp: Pretty good privacy. (O’Reilly and Associates Inc.) doi
  11. (1997). Proactive public key and signature systems. In: doi
  12. (2001). Providing robust and ubiquitous security support for mobile ad hoc networks. In: doi
  13. (1998). Robust efficient distributed rsa-key generation. In: doi
  14. (2002). S.: Towards a survivable security architecture for ad-hoc networks. doi
  15. (1999). Securing ad hoc networks. doi
  16. (1997). Split knowledge generation of rsa parameters. In: doi
  17. (1982). The byzantine generals problem. doi
  18. (2001). The quest for security in mobile ad hoc networks. In: doi
  19. (1989). Threshold cryptosystems. In: doi

To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.