2009 International Conference on Information Technology and Computer Science 2009
DOI: 10.1109/itcs.2009.119
View full text |Buy / Rent full text
|
Sign up to set email alerts
|
Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
2

Relationship

0
2

Authors

Journals

citations
Cited by 4 publications
(2 citation statements)
references
References 11 publications
(2 reference statements)
0
2
0
Order By: Relevance
“…Most of the schemes proposed in this approach use prime numbers fundamental properties (Akl and Taylor [12], Ray et al [13], Zou et al [14]) and other theoretical cryptographic notions (Hardjono et al [15] and Zheng et al [16]). Shen and Chen [17], Zhang et al [18], Tzang et al [19] and Das et al [20] used Newton's polynomial interpolation to correlate classes' indices with their keys.…”
Section: Key Management Schemes For Cachmentioning
confidence: 99%
“…Most of the schemes proposed in this approach use prime numbers fundamental properties (Akl and Taylor [12], Ray et al [13], Zou et al [14]) and other theoretical cryptographic notions (Hardjono et al [15] and Zheng et al [16]). Shen and Chen [17], Zhang et al [18], Tzang et al [19] and Das et al [20] used Newton's polynomial interpolation to correlate classes' indices with their keys.…”
Section: Key Management Schemes For Cachmentioning
confidence: 99%
“…Most of the schemes proposed in this approach use prime numbers fundamental properties (Akl and Taylor [22], Ray et al [29], Zou et al [30]), and other theoretical cryptographic notions, including Chinese reminder theorem (Hardjono et al [31] and Zheng et al [32]). Shen and Chen [33], Zhang et al [34], Tzang et al [35] and Das et al [36] use Newton's polynomial interpolation to correlate classes' indices and their keys. Whereas Aparna et al [37] use threshold cryptography to reduce the cost of key renewal, and Liu et al [38] use elliptic curves.…”
Section: Existing Key Management Schemesmentioning
confidence: 99%