Search

Your search keyword '"Access structure"' showing total 825 results

Search Constraints

Start Over You searched for: Descriptor "Access structure" Remove constraint Descriptor: "Access structure" Language undetermined Remove constraint Language: undetermined
825 results on '"Access structure"'

Search Results

1. On ideal and weakly-ideal access structures

2. Multi-GPU Efficient Indexing For Maximizing Parallelism of High Dimensional Range Query Services

3. An Expressive Fully Policy-Hidden Ciphertext Policy Attribute-Based Encryption Scheme With Credible Verification Based on Blockchain

4. TRAC: Traceable and Revocable Access Control Scheme for mHealth in 5G-Enabled IIoT

5. Unbounded and Efficient Revocable Attribute-Based Encryption With Adaptive Security for Cloud-Assisted Internet of Things

6. Efficient Explicit Constructions of Multipartite Secret Sharing Schemes

7. Privacy information verification of homomorphic algorithm for aggregated data based on fog layer structure

8. Towards cheat-preventing in block-based progressive visual cryptography for general access structures

9. A Blockchain-Based CP-ABE Scheme with Partially Hidden Access Structures

10. Secret Sharing Schemes from Linear Codes over F2+vF2+v2F2

11. PAC: Privacy preserving proxy re-encryption for access control in public cloud

12. A CP-ABE scheme based on multi-authority in hybrid clouds for mobile devices

13. An Efficient Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations

14. Construction of XVCS for (k,n,t)∗ access structure

15. On ideal homomorphic secret sharing schemes and their decomposition

16. An efficient outsourcing attribute-based encryption scheme in 5G mobile network environments

17. Complex and flexible data access policy in attribute-based encryption

18. Boolean functions with six-valued Walsh spectra and their application

19. APPLSS: Adaptive privacy preserved location sharing scheme based on attribute-based encryption

20. PHAS-HEKR-CP-ABE: partially policy-hidden CP-ABE with highly efficient key revocation in cloud data sharing system

21. Secure Ride-Sharing Services Based on a Consortium Blockchain

22. A Secure and Policy-Controlled Signature Scheme With Strong Expressiveness and Privacy-Preserving Policy

23. A Novel ( t , s , k , n )-Threshold Visual Secret Sharing Scheme Based on Access Structure Partition

24. Secret sharing and duality

25. Attribute-Based Encryption With Parallel Outsourced Decryption for Edge Intelligent IoV

26. On the Power of Amortization in Secret Sharing

27. Advanced attribute-based encryption protocol based on the modified secret sharing scheme

28. The lower bound and exact value of the information rate of some developed graph access structures

29. An attribute-based keyword search for m-Health networks

30. A New Approach to Verifying and Sharing a Secret QR Code using Elliptic Curves

31. Efficient attribute-based encryption with repeated attributes optimization

32. Attribute-Based Authenticated Group Key Transfer Protocol without Pairing

33. Message randomization and strong security in quantum stabilizer-based secret sharing for classical secrets

34. Unified multiple access structure based on FBMC modulation for multi‐RAT coexistence in heterogeneous wireless networks

35. Multiple secret image sharing with general access structure

36. An attribute-based lightweight cloud data access control using hypergraph structure

37. Finding the maximal adversary structure from any given access structure

38. Expressive Attribute-Based Encryption with Constant-Size Ciphertexts from the Decisional Linear Assumption

39. Simplified Ciphertext Policy Attribute Based Encryption for Multimedia Applications

40. Efficient Multi-authority Access Control using Attribute-based Encryption in Cloud Storage

41. General quantum secret sharing scheme based on two qudit

43. On Abelian and Homomorphic Secret Sharing Schemes

44. A Novel Threshold Secret Sharing Scheme for CP-ABE

45. A Survey on Secured Data Sharing using Ciphertext Policy Attribute Based Encryption in Cloud

46. An Attribute-Based Controlled Collaborative Access Control Scheme for Public Cloud Storage

47. Four classes of minimal binary linear codes with $$w_{min}/w_{max}<1/2$$ derived from Boolean functions

48. Secure Online/Offline Data Sharing Framework for Cloud-Assisted Industrial Internet of Things

49. Dynamic Policy Attribute Based Encryption and its Application in Generic Construction of Multi-Keyword Search

50. A fully dynamic secret sharing scheme

Catalog

Books, media, physical & digital resources