Skip to search formSkip to main contentSkip to account menu

Access structure

Access structures are used in the study of security system where multiple parties need to work together to obtain a resource. Groups of parties that… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
  • Kwankyu Lee
  • 2015
  • Corpus ID: 38868819
2014
2014
Attribute Based Encryption (CP-ABE) access control schemes has become a heated topic area in security since it is more suitable… 
2014
2014
Two compartmented secret sharing schemes are proposed in this paper. Constructions of the proposed schemes are based on the… 
2013
2013
: - An effective and secure protection of sensitive information is the primary concerned in Communication systems or network… 
2009
2009
Beutelspacher considered a secret sharing scheme having a veto capability. Obana and Kurosawa proved that there exist no such… 
2006
2006
We consider the problem of cheating in secret sharing schemes, cheating in which individuals submit forged shares in the secret… 
2000
2000
Significant research has focused on determining efficient me thodologies for retrieving images in large image databases. In this… 
1999
1999
The use of strain to direct the assembly of nanoparticle arrays in a semiconductor is investigated experimentally and… 
Highly Cited
1989
Highly Cited
1989
The authors present a simulation study of an adaptive receiver, based on the concept of maximum-likelihood sequence estimation…