
Efficient utilization of elliptic curve cryptosystem for hierarchical access control
Keywords: سلسله مراتب کاربر; Key management; Elliptic curve cryptosystems; Access control; User hierarchy; Security