1994 | ||
---|---|---|
4 | EE | Chin-Chen Chang, J. K. Jan, Daniel J. Buehrer: A scheme to determine the relationship between two users in a hierarchy. Computers & Security 13(3): 255-261 (1994) |
1993 | ||
3 | J. K. Jan, Chin-Chen Chang: A Key-Lock-Pair Oriented Access Control Scheme for the Growth of Users and Files. BIT 33(3): 382-389 (1993) | |
1991 | ||
2 | Chin-Chen Chang, C. Y. Chen, J. K. Jan: On the Design of a Machine-Independent Perfect Hashing Scheme. Comput. J. 34(5): 469-474 (1991) | |
1 | EE | J. K. Jan, Chin-Chen Chang, S. J. Wang: A dynamic key-lock-pair access control scheme. Computers & Security 10(2): 129-139 (1991) |
1 | Daniel J. Buehrer | [4] |
2 | Chin-Chen Chang | [1] [2] [3] [4] |
3 | C. Y. Chen | [2] |
4 | S. J. Wang | [1] |