Constructing Key Assignment Schemes from Chain Partitions. / Crampton, J.; Daud, R.; Martin, Keith M.; Foresti, S. (Editor); Jajodia, S. (Editor).

Data and Applications Security and Privacy XXIV. Vol. 6166 Springer, 2010. p. 130-145 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Published

Standard

Constructing Key Assignment Schemes from Chain Partitions. / Crampton, J.; Daud, R.; Martin, Keith M.; Foresti, S. (Editor); Jajodia, S. (Editor).

Data and Applications Security and Privacy XXIV. Vol. 6166 Springer, 2010. p. 130-145 (Lecture Notes in Computer Science).

Research output: Chapter in Book/Report/Conference proceedingConference contribution

Harvard

Crampton, J, Daud, R, Martin, KM, Foresti, S (ed.) & Jajodia, S (ed.) 2010, Constructing Key Assignment Schemes from Chain Partitions. in Data and Applications Security and Privacy XXIV. vol. 6166, Lecture Notes in Computer Science, Springer, pp. 130-145. https://doi.org/10.1007/978-3-642-13739-6_9

APA

Crampton, J., Daud, R., Martin, K. M., Foresti, S. (Ed.), & Jajodia, S. (Ed.) (2010). Constructing Key Assignment Schemes from Chain Partitions. In Data and Applications Security and Privacy XXIV (Vol. 6166, pp. 130-145). (Lecture Notes in Computer Science). Springer. https://doi.org/10.1007/978-3-642-13739-6_9

Vancouver

Crampton J, Daud R, Martin KM, Foresti S, (ed.), Jajodia S, (ed.). Constructing Key Assignment Schemes from Chain Partitions. In Data and Applications Security and Privacy XXIV. Vol. 6166. Springer. 2010. p. 130-145. (Lecture Notes in Computer Science). https://doi.org/10.1007/978-3-642-13739-6_9

Author

Crampton, J. ; Daud, R. ; Martin, Keith M. ; Foresti, S. (Editor) ; Jajodia, S. (Editor). / Constructing Key Assignment Schemes from Chain Partitions. Data and Applications Security and Privacy XXIV. Vol. 6166 Springer, 2010. pp. 130-145 (Lecture Notes in Computer Science).

BibTeX

@inproceedings{99c4f4f998ae494c899927aafcda1f6a,
title = "Constructing Key Assignment Schemes from Chain Partitions",
author = "J. Crampton and R. Daud and Martin, {Keith M.} and S. Foresti and S. Jajodia",
year = "2010",
doi = "10.1007/978-3-642-13739-6_9",
language = "English",
volume = "6166",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "130--145",
booktitle = "Data and Applications Security and Privacy XXIV",

}

RIS

TY - GEN

T1 - Constructing Key Assignment Schemes from Chain Partitions

AU - Crampton, J.

AU - Daud, R.

AU - Martin, Keith M.

A2 - Foresti, S.

A2 - Jajodia, S.

PY - 2010

Y1 - 2010

U2 - 10.1007/978-3-642-13739-6_9

DO - 10.1007/978-3-642-13739-6_9

M3 - Conference contribution

VL - 6166

T3 - Lecture Notes in Computer Science

SP - 130

EP - 145

BT - Data and Applications Security and Privacy XXIV

PB - Springer

ER -