![]() |
| 1985 | ||
|---|---|---|
| 2 | Stephen J. MacKinnon, Peter D. Taylor, Henk Meijer, Selim G. Akl: An Optimal Algorithm for Assigning Cryptographic Keys to Control Access in a Hierarchy. IEEE Trans. Computers 34(9): 797-802 (1985) | |
| 1983 | ||
| 1 | Stephen J. MacKinnon, Selim G. Akl: New Key Generation Algorithms for Multilevel Security. IEEE Symposium on Security and Privacy 1983: 72-78 | |
| 1 | Selim G. Akl | [1] [2] |
| 2 | Henk Meijer | [2] |
| 3 | Peter D. Taylor | [2] |