2016
DOI: 10.3103/s0146411616080071
|View full text |Cite
|
Sign up to set email alerts
|

Distribution of cryptographic keys in systems with a hierarchy of objects

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
10
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
5
1

Relationship

1
5

Authors

Journals

citations
Cited by 8 publications
(10 citation statements)
references
References 4 publications
0
10
0
Order By: Relevance
“…The role of blockchain transparency in risk management is that all participants every time get replicated verified blockchain-based data. This eliminates the potential risks of possible mistakes in the distribution of information from a centralized database [15].…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…The role of blockchain transparency in risk management is that all participants every time get replicated verified blockchain-based data. This eliminates the potential risks of possible mistakes in the distribution of information from a centralized database [15].…”
Section: Discussionmentioning
confidence: 99%
“…Researchers believe that the main directions of using blockchain technology in various spheres of human activity include: -public administration, when blockchain allows maintaining decentralized state registers, in particular registers of ownership of land, real estate, etc. Using them, one can effectively manage any assets or information with high transparency of operations [14]; -public and private electronic document management [10]; -public opinion polls audit of conducted public procurement or supplies [15]; -protection of intellectual property based on smart contracts [16]; -agricultural sector, in particular, for maintaining a register of animal identification helping to trace livestock products from birth to the moment products are delivered to the energy retail network for the redistribution and exchange of surplus energy between network users [13]; -banking sectorfor maintaining, for example, registers of bank guarantees [17]; -healthcarefor maintaining various registers (patients, medicines, medical equipment, etc.) [12].…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…We will set the Sperner's family as follows: 4, 6, 7, 8, 9, 10}, S 3 = S 6 ∪ S 7 ∪ D 3 = {5, 11, 12, 13, 14, 15}, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15}. Process of formation sets S is presented in the figure 2. 2,3,4,5,6,7,8,11,12,13,14, 15}, 2, 3, 4, 5, 6, 7, 8, 9, 10, 14, 15}, 2,3,4,5,6,7,8,9,10,11,12, 13}, k 51 = 0, k 52 = 0, k 53 = 0, k 54 = 0, k 56 = 0, k 57 = 0, k 61 = 0, k 62 = 0, k 63 = 0, k 64 = 0, k 65 = 0, k 67 = 0, k 71 = 0, k 72 = 0, k 73 = 0, k 74 = 0, k 75 = 0, k 76 = 0.…”
Section: Example Of Keys Preliminary Distribution Schemementioning
confidence: 99%
“…Mandatory security policy demands accounting of hierarchy, both subjects, and objects. The decision on the basis of hash functions is suggested in article [7]. However this approach does not allow realizing exchange between users taking into account hierarchy.…”
Section: Introductionmentioning
confidence: 99%