Access structure

Access structures are used in the study of security system where multiple parties need to work together to obtain a resource. Groups of parties that… (More)
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2012
Highly Cited
2012
Conventional visual secret sharing schemes generate noise-like random pixels on shares to hide secret images. It suffers a… (More)
  • figure 1
  • figure 2
  • table I
  • figure 3
  • table III
Is this relevant?
Highly Cited
2011
Highly Cited
2011
We propose a new model for data storage and access in clouds. Our scheme avoids storing multiple encrypted copies of same data… (More)
  • figure 1
  • table I
  • figure 2
  • table II
Is this relevant?
Highly Cited
2010
Highly Cited
2010
Ciphertext-Policy Attribute Based Encryption (CP-ABE) is a promising cryptographic primitive for fine-grained access control of… (More)
  • figure 1
  • figure 2
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
We propose attribute-based encryption schemes where encryptor-specified access structures (also called ciphertext policies) are… (More)
  • table 1
Is this relevant?
Highly Cited
2007
Highly Cited
2007
We consider a multi-channel opportunistic communication system where the states of these channels evolve as independent and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 5
  • figure 6
Is this relevant?
Highly Cited
2007
Highly Cited
2007
Built on a hierarchical access structure with primary and secondary users, opportunistic spectrum access improves spectrum… (More)
Is this relevant?
Highly Cited
2001
Highly Cited
1997
Highly Cited
1997
An efficient multiversion access structure for a transaction-time database is presented. Our method requires optimal storage and… (More)
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
1997
Highly Cited
1997
Proactive secret sharing deals with refreshing secret shares i e redistributing the shares of a secret to the original access… (More)
Is this relevant?
Highly Cited
1990
Highly Cited
1990
In this paper, we describe a new indexing technique, the time indez, for improving the performance of certain classes of temporal… (More)
  • figure 1
  • figure 3
  • figure 5
  • figure 4
  • figure 6
Is this relevant?