Search

Your search keyword '"Access structure"' showing total 246 results

Search Constraints

Start Over You searched for: Descriptor "Access structure" Remove constraint Descriptor: "Access structure" Language english Remove constraint Language: english
246 results on '"Access structure"'

Search Results

1. Verifiable quantum secret sharing scheme using Bell states for a class of special access structures.

2. Constructions of some secret sharing schemes based on linear codes

3. A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure.

4. Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing.

5. Reducing The Computational Complexity of Fuzzy Identity-Based Encryption from Lattice

6. Verifiable Quantum Secret Sharing Scheme Based on LDPC Codes.

7. Reducing The Computational Complexity of Fuzzy Identity-Based Encryption from Lattice.

8. A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure

9. Authenticable quantum multi-secret sharing scheme based on monotone span program.

10. A survey on attribute-based encryption for Internet of Things.

11. Public key encryption with distributed keyword search.

12. Quantum secret sharing based on quantum information masking.

13. PAC: Privacy preserving proxy re-encryption for access control in public cloud.

14. An Investigation of Corpus Contributions to Lexicographic Challenges over the Past Ten Years.

15. Multi-Receiver Authentication Scheme for General Access Structure

16. An Outsourced Decryption ABE Model using ECC in Internet of Things.

17. On group-characterizability of homomorphic secret sharing schemes.

18. General quantum secret sharing scheme based on two qudit.

19. Construction of XVCS for (k,n,t)∗ access structure.

20. Attribute-based encryption schema with group signatures

21. Attribute-based encryption schema with group signatures

22. The quantum secret sharing schemes based on hyperstar access structures.

23. An efficient Boolean based multi-secret image sharing scheme.

24. An Efficient Elliptic Curve Cryptography-Based Without Pairing KPABE for Internet of Things.

25. An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme with Policy Update.

26. An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud.

27. Efficient Multi-authority Access Control using Attribute-based Encryption in Cloud Storage.

28. The complexity of the connected graph access structure on seven participants

29. A Ciphertext-Policy Attribute-Based Encryption Based on an Ordered Binary Decision Diagram

30. Innoverende toegangsroetes in selfoonwoordeboeke

31. Finding the maximal adversary structure from any given access structure.

32. A Proactive Multi Stage Secret Sharing Scheme for Any Given Access Structure.

34. A characterisation of ideal weighted secret sharing schemes

35. Design of Secret Reconstruction With Optimal Communication Efficiency.

36. Collaborative Visual Cryptography Schemes.

37. Constructing visual cryptography scheme by hypergraph decomposition.

38. Mesh Signatures : How to Leak a Secret with Unwitting and Unwilling Participants

39. Community-Centric Vanilla-Rollback Access, or: How I Stopped Worrying and Learned to Love My Computer : (Transcript of Discussion)

40. Protocols for Supporting a Public Key Infrastructure in Ad Hoc Networks : (Transcript of Discussion)

41. A General Lexicographic Model for a Typological Variety of Dictionaries in African Languages

42. A Novel Attribute-Based Encryption Approach with Integrity Verification for CAD Assembly Models

44. ABKS-PBM: Attribute-Based Keyword Search With Partial Bilinear Map

45. Provably secure verifiable multi‐stage secret sharing scheme based on monotone span program.

46. Hidden policy ciphertext-policy attribute-based encryption with keyword search against keyword guessing attack.

47. A New Improving Quantum Secret Sharing Scheme.

48. The complexity of the connected graph access structure on seven participants.

49. Searchable ciphertext-policy attribute-based encryption with revocation in cloud storage.

50. Secret sharing schemes based on additive codes over GF(4).

Catalog

Books, media, physical & digital resources