default search action
"Using Cryptographic Hash Functions for Discretionary Access Control in ..."
Ahmad Baraani-Dastjerdi et al. (1997)
- Ahmad Baraani-Dastjerdi, Josef Pieprzyk, Reihaneh Safavi-Naini, Janusz R. Getta:
Using Cryptographic Hash Functions for Discretionary Access Control in Object-Oriented Databases. J. Univers. Comput. Sci. 3(6): 730-753 (1997)
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.