Article ID Journal Published Year Pages File Type
10340405 Computer Standards & Interfaces 2005 4 Pages PDF
Abstract
In this paper, we analyse the security of a cryptographic key assignment scheme, recently proposed by Huang and Chang, that is designed to provide time-constrained hierarchical access control. We show that the new scheme has potential security vulnerabilities, which enable malicious users and attackers to violate the privacy of other users.
Related Topics
Physical Sciences and Engineering Computer Science Computer Networks and Communications
Authors
, ,