Browsing by Subject "Computer access control"
Now showing items 1-1 of 1
-
Indirect key derivation schemes for key management of access hierarchies
(2004)In this thesis, we study the problem of key management within an access hierarchy. Our contribution to the key management problem is an indirect key derivation approach we call the HMAC-method. It is called the HMAC-method, ...