Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 231,961,318 papers from all fields of science
Search
Sign In
Create Free Account
Access structure
Access structures are used in the study of security system where multiple parties need to work together to obtain a resource. Groups of parties that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Access control
Cryptography
Digital signature
Secret sharing
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Bounds for generalized Hamming weights of general AG codes
Kwankyu Lee
Finite Fields Their Appl.
2015
Corpus ID: 38868819
2014
2014
A CP-ABE scheme with system attributes revocation in cloud storage
Anping Xiong
,
Chunxiang Xu
,
Qi-Xian Gan
11th International Computer Conference on Wavelet…
2014
Corpus ID: 15558291
Attribute Based Encryption (CP-ABE) access control schemes has become a heated topic area in security since it is more suitable…
Expand
2014
2014
Computationally perfect compartmented secret sharing schemes based on MDS codes
A. Tentu
,
P. Paul
,
V. Venkaiah
International Journal of Trust Management in…
2014
Corpus ID: 20839030
Two compartmented secret sharing schemes are proposed in this paper. Constructions of the proposed schemes are based on the…
Expand
2013
2013
SECURE VISUAL CRYPTOGRAPHY
R. Yadagiri
,
Rao Assoc Professor
,
R. Swetha
,
Paritala Ramanjaneyulu
2013
Corpus ID: 14685925
: - An effective and secure protection of sensitive information is the primary concerned in Communication systems or network…
Expand
2009
2009
An ID-based group-oriented decryption scheme secure against adaptive chosen-ciphertext attacks
T. Chang
Computer Communications
2009
Corpus ID: 20467760
2009
2009
Visual Cryptography Schemes with Veto Capabilities
M. H. Dehkordi
,
A. Cheraghi
2009
Corpus ID: 12279081
Beutelspacher considered a secret sharing scheme having a veto capability. Obana and Kurosawa proved that there exist no such…
Expand
2006
2006
Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution
Satoshi Obana
,
Toshinori Araki
International Conference on the Theory and…
2006
Corpus ID: 2819406
We consider the problem of cheating in secret sharing schemes, cheating in which individuals submit forged shares in the secret…
Expand
2000
2000
Content-Based Image Retrieval Using Binary Signatures
Vishal Chitkara
,
Mario A Nascimento
,
Curt Mastaller
2000
Corpus ID: 18821525
Significant research has focused on determining efficient me thodologies for retrieving images in large image databases. In this…
Expand
1999
1999
Strain Directed Assembly of Nanoparticle Arrays Within a Semiconductor
C. Hung
,
A. Marshall
,
D. Kim
,
W. D. Nix
,
J. Harris
,
R. Kiehl
1999
Corpus ID: 1072805
The use of strain to direct the assembly of nanoparticle arrays in a semiconductor is investigated experimentally and…
Expand
Highly Cited
1989
Highly Cited
1989
An adaptive MLSE receiver for TDMA digital mobile radio
R. D'Avella
,
Luigi Moreno
,
M. Sant'Agostino
IEEE J. Sel. Areas Commun.
1989
Corpus ID: 12183392
The authors present a simulation study of an adaptive receiver, based on the concept of maximum-likelihood sequence estimation…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE