Skip to search formSkip to main contentSkip to account menu

Access structure

Access structures are used in the study of security system where multiple parties need to work together to obtain a resource. Groups of parties that… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
  • Kwankyu Lee
  • 2015
  • Corpus ID: 38868819
2014
2014
Attribute Based Encryption (CP-ABE) access control schemes has become a heated topic area in security since it is more suitable… 
2013
2013
: - An effective and secure protection of sensitive information is the primary concerned in Communication systems or network… 
2005
2005
In threshold cryptography, the goal is to distribute the computation of basic cryptographic primitives across a number of nodes… 
2004
2004
We propose efficient and secure (string) oblivious transfer (OT/sup 1//sub n/) schemes for any n/spl ges/2. We build our OT/sup 1… 
2000
2000
Significant research has focused on determining efficient me thodologies for retrieving images in large image databases. In this… 
1999
1999
The use of strain to direct the assembly of nanoparticle arrays in a semiconductor is investigated experimentally and… 
Review
1993
Review
1993
In this paper Green's (1989) notion of "cognitive dimensions" is used to consider the properties of notations and media for… 
Highly Cited
1989
Highly Cited
1989
The authors present a simulation study of an adaptive receiver, based on the concept of maximum-likelihood sequence estimation…