Conference paper
Optimization algorithms for energy-efficient data centers
Hendrik F. Hamann
InterPACK 2013
In [1], Tzeng proposed a time-bound cryptographic key assignment scheme for access control in a partial-order hierarchy. In this paper, we show that Tzeng's scheme is insecure against the collusion attack whereby three users conspire to access some secret class keys that they should not know according to Tzeng's scheme.
Hendrik F. Hamann
InterPACK 2013
B.K. Boguraev, Mary S. Neff
HICSS 2000
Leo Liberti, James Ostrowski
Journal of Global Optimization
Elizabeth A. Sholler, Frederick M. Meyer, et al.
SPIE AeroSense 1997