"Using Cryptographic Hash Functions for Discretionary Access Control in ..."

Ahmad Baraani-Dastjerdi et al. (1997)

Details and statistics

DOI: 10.3217/JUCS-003-06-0730

access: open

type: Journal Article

metadata version: 2023-09-07

a service of  Schloss Dagstuhl - Leibniz Center for Informatics