18.02.2015 Views

目錄 - 研究發展處 - 稻江科技暨管理學院

目錄 - 研究發展處 - 稻江科技暨管理學院

目錄 - 研究發展處 - 稻江科技暨管理學院

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

稻 江 學 報 第 五 卷 第 一 期<br />

Journal on Selected Areas in Communications, 20(8), 1500-1510.<br />

[17] Chan, K. C. Gary Chan, S. H. (2003). Key management approaches to offer data confidentiality for secure<br />

multicast. IEEE Network, 30-39.<br />

[18] Akl, S. G. Taylor, P. D. (1983). Cryptographic solution to a problem of access control in a hierarchy. ACM<br />

Trans. on Comput. Syst., 1(3), 239-247.<br />

[19] MacKinnon, S. T. Taylor, P. D. Meijer, H. Akl, S. G. (1985). An optimal algorithm for assigning cryptographic<br />

keys to control access in a hierarchy. IEEE Trans. on Comput., 24(9), 797–802.<br />

[20] Harn, L. Lin, H. Y. (1990). A cryptographic key generation scheme for multilevel data security. Comput.<br />

& Secur., 9, 539–546.<br />

[21] H. M. Tsai, C. C. Chang, (1995). A cryptographic implementation for dynamic access control in a user<br />

hierarchy. Comput. and Secur., 14(2), 857–959.<br />

[22] Wen, J. H. Wu, M. C. Chen, T. S. (2007). A Novel Elliptic Curve Dynamic Access Control System, IEICE<br />

Trans. on Communications, E90-B(8), 1979-1987.<br />

[23] Menezes, A. J. (1997). Elliptic curve public key cryptosystems. Boston: Kluwer Academic Publishers.<br />

[24] knapp, A. w. (1992). Elliptic Curve. Princeton University Prece.<br />

[25] Silverman, J. H. Tate, J. (1992). Rational Points on Elliptic Curves. New York: Springer-Verlag.<br />

[26] Silverman, J. H. (1986). The Arithmetic of Elliptic Curves. New York: Springer-Verlag.<br />

50

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!