Constructing Key Assignment Schemes from Chain Partitions. / Crampton, J.; Daud, R.; Martin, Keith M.; Foresti, S. (Editor); Jajodia, S. (Editor).

Data and Applications Security and Privacy XXIV. Vol. 6166 Springer, 2010. p. 130-145 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published
Original languageEnglish
Title of host publicationData and Applications Security and Privacy XXIV
PublisherSpringer
Pages130-145
Number of pages16
Volume6166
DOIs
StatePublished - 2010

Publication series

NameLecture Notes in Computer Science
This open access research output is licenced under a Creative Commons Attribution-NonCommercial-NoDerivs 3.0 Unported License.

ID: 2764188