Skip to search formSkip to main contentSkip to account menu

Access structure

Access structures are used in the study of security system where multiple parties need to work together to obtain a resource. Groups of parties that… 
Wikipedia (opens in a new tab)

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
Designing a protocol for the protection of sensitive information from possible thefts, losses, and damages is an important area… 
2013
2013
: - An effective and secure protection of sensitive information is the primary concerned in Communication systems or network… 
2013
2013
An efficient method of predicting the ultimate strength of stiffened panels under combined loads has been implemented in ALPS… 
Review
2013
Review
2013
With the rapid development of cloud computing, more and more users begin to share documents in cloud servers. Since cloud servers… 
2009
2009
Beutelspacher considered a secret sharing scheme having a veto capability. Obana and Kurosawa proved that there exist no such… 
2000
2000
Significant research has focused on determining efficient me thodologies for retrieving images in large image databases. In this… 
1999
1999
The use of strain to direct the assembly of nanoparticle arrays in a semiconductor is investigated experimentally and… 
Highly Cited
1989
Highly Cited
1989
The authors present a simulation study of an adaptive receiver, based on the concept of maximum-likelihood sequence estimation… 
1987
1987
To be fully integrated, the Integrated Service Digital Network (ISDN) arena is preparing an evolution from its current narrowband…