Constructing Key Assignment Schemes from Chain Partitions. / Crampton, J.; Daud, R.; Martin, Keith M.; Foresti, S. (Editor); Jajodia, S. (Editor).
Data and Applications Security and Privacy XXIV. Vol. 6166 Springer, 2010. p. 130-145 (Lecture Notes in Computer Science).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
Constructing Key Assignment Schemes from Chain Partitions. / Crampton, J.; Daud, R.; Martin, Keith M.; Foresti, S. (Editor); Jajodia, S. (Editor).
Data and Applications Security and Privacy XXIV. Vol. 6166 Springer, 2010. p. 130-145 (Lecture Notes in Computer Science).Research output: Chapter in Book/Report/Conference proceeding › Conference contribution
}
TY - GEN
T1 - Constructing Key Assignment Schemes from Chain Partitions
AU - Crampton, J.
AU - Daud, R.
AU - Martin, Keith M.
A2 - Foresti, S.
A2 - Jajodia, S.
PY - 2010
Y1 - 2010
U2 - 10.1007/978-3-642-13739-6_9
DO - 10.1007/978-3-642-13739-6_9
M3 - Conference contribution
VL - 6166
T3 - Lecture Notes in Computer Science
SP - 130
EP - 145
BT - Data and Applications Security and Privacy XXIV
PB - Springer
ER -