Search

Your search keyword '"Access structure"' showing total 1,398 results

Search Constraints

Start Over You searched for: Descriptor "Access structure" Remove constraint Descriptor: "Access structure"
1,398 results on '"Access structure"'

Search Results

1. Verifiable quantum secret sharing scheme using Bell states for a class of special access structures.

2. Constructions of some secret sharing schemes based on linear codes

3. A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure.

4. Mh-abe: multi-authority and hierarchical attribute based encryption scheme for secure electronic health record sharing.

5. Reducing The Computational Complexity of Fuzzy Identity-Based Encryption from Lattice

6. Verifiable Quantum Secret Sharing Scheme Based on LDPC Codes.

7. Reducing The Computational Complexity of Fuzzy Identity-Based Encryption from Lattice.

8. A Verifiable Multi-Secret Sharing Scheme for Hierarchical Access Structure

10. Authenticable quantum multi-secret sharing scheme based on monotone span program.

11. Attribute-based encryption scheme against key abuse based on OBDD access structure from lattice

12. Efficient Direct and Immediate User Revocable Attribute-Based Encryption Scheme

13. A survey on attribute-based encryption for Internet of Things.

14. Attribute-based encryption scheme against key abuse based on OBDD access structure from lattice.

16. Public key encryption with distributed keyword search.

17. Quantum secret sharing based on quantum information masking.

19. Survey of Attribute-Based Encryption in Cloud Environment

20. PAC: Privacy preserving proxy re-encryption for access control in public cloud.

21. Innoverende toegangsroetes in selfoonwoordeboeke.

22. Operations over Linear Secret Sharing Schemes

23. An Investigation of Corpus Contributions to Lexicographic Challenges over the Past Ten Years.

24. Multi-Receiver Authentication Scheme for General Access Structure

25. An Outsourced Decryption ABE Model using ECC in Internet of Things.

26. On group-characterizability of homomorphic secret sharing schemes.

27. General quantum secret sharing scheme based on two qudit.

28. A Ciphertext-Policy Attribute-Based Encryption Based on Multi-valued Decision Diagram

30. On the Equivalence of 2-Threshold Secret Sharing Schemes and Prefix Codes

31. Construction of XVCS for (k,n,t)∗ access structure.

32. Attribute-based encryption schema with group signatures

33. Attribute-based encryption schema with group signatures

34. On the Security of a Searchable Anonymous Attribute Based Encryption

37. Design of Visual Cryptography Scheme Using C(m, w) Combinations

39. Privacy-Preserving Proxy Re-encryption with Fine-Grained Access Control

40. Evolving Secret Sharing: Dynamic Thresholds and Robustness

41. A Novel Visual Cryptography Scheme with Different Importance of Shadows

42. On ideal and weakly-ideal access structures

43. The quantum secret sharing schemes based on hyperstar access structures.

44. An efficient Boolean based multi-secret image sharing scheme.

45. An Efficient Elliptic Curve Cryptography-Based Without Pairing KPABE for Internet of Things.

46. An Efficient Ciphertext-Policy Attribute-Based Encryption Scheme with Policy Update.

47. An enhanced media ciphertext-policy attribute-based encryption algorithm on media cloud.

48. Efficient Multi-authority Access Control using Attribute-based Encryption in Cloud Storage.

Catalog

Books, media, physical & digital resources