Conference paper
Modeling polarization for Hyper-NA lithography tools and masks
Kafai Lai, Alan E. Rosenbluth, et al.
SPIE Advanced Lithography 2007
In [1], Tzeng proposed a time-bound cryptographic key assignment scheme for access control in a partial-order hierarchy. In this paper, we show that Tzeng's scheme is insecure against the collusion attack whereby three users conspire to access some secret class keys that they should not know according to Tzeng's scheme.
Kafai Lai, Alan E. Rosenbluth, et al.
SPIE Advanced Lithography 2007
Rafae Bhatti, Elisa Bertino, et al.
Communications of the ACM
Maurice Hanan, Peter K. Wolff, et al.
DAC 1976
Robert G. Farrell, Catalina M. Danis, et al.
RecSys 2012