Conference paper
Some experimental results on placement techniques
Maurice Hanan, Peter K. Wolff, et al.
DAC 1976
In [1], Tzeng proposed a time-bound cryptographic key assignment scheme for access control in a partial-order hierarchy. In this paper, we show that Tzeng's scheme is insecure against the collusion attack whereby three users conspire to access some secret class keys that they should not know according to Tzeng's scheme.
Maurice Hanan, Peter K. Wolff, et al.
DAC 1976
B. Wagle
EJOR
Raymond Wu, Jie Lu
ITA Conference 2007
Thomas R. Puzak, A. Hartstein, et al.
CF 2007