Avoiding key redistribution in key assignment schemes

H. Rowe, J. Crampton

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Original languageEnglish
Title of host publicationProceedings of the Fourth International Workshop on Mathematical Methods, Models, and Architectures for Computer Network Security
Pages127-140
Number of pages14
Publication statusPublished - 2007

Cite this