Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 233,434,875 papers from all fields of science
Search
Sign In
Create Free Account
Access structure
Access structures are used in the study of security system where multiple parties need to work together to obtain a resource. Groups of parties that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Access control
Cryptography
Digital signature
Secret sharing
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2019
2019
An Extended Protected Secret Sharing Scheme
Irfan Alam
,
A. Basit
IEEE Uttar Pradesh Section International…
2019
Corpus ID: 211057871
Designing a protocol for the protection of sensitive information from possible thefts, losses, and damages is an important area…
Expand
2019
2019
On relaxed security notions for secret sharing
A. Jafari
,
Shahram Khazaei
IACR Cryptology ePrint Archive
2019
Corpus ID: 174783292
,
2013
2013
SECURE VISUAL CRYPTOGRAPHY
R. Yadagiri
,
R. Professor
,
R. Swetha
,
P. Ramanjaneyulu
2013
Corpus ID: 14685925
: - An effective and secure protection of sensitive information is the primary concerned in Communication systems or network…
Expand
2013
2013
ULTIMATE STRENGTH BASED STIFFENED PANEL DESIGN USING MULTI-OBJECTIVE OPTIMIZATION METHODS AND ITS APPLICATION TO SHIP STRUCTURES
M. Ma
,
O. Hughes
,
J. Paik
2013
Corpus ID: 53367230
An efficient method of predicting the ultimate strength of stiffened panels under combined loads has been implemented in ALPS…
Expand
Review
2013
Review
2013
Fine-grained document sharing using attribute-based encryption in cloud servers
Dongyang Xu
,
Fengying Luo
,
Lin Gao
,
Zhi Tang
InTech
2013
Corpus ID: 18237015
With the rapid development of cloud computing, more and more users begin to share documents in cloud servers. Since cloud servers…
Expand
2009
2009
Visual Cryptography Schemes with Veto Capabilities
M. H. Dehkordi
,
A. Cheraghi
2009
Corpus ID: 12279081
Beutelspacher considered a secret sharing scheme having a veto capability. Obana and Kurosawa proved that there exist no such…
Expand
2000
2000
Content-Based Image Retrieval Using Binary Signatures
Vishal Chitkara
,
Mario A. Nascimento
,
Curt Mastaller
2000
Corpus ID: 18821525
Significant research has focused on determining efficient me thodologies for retrieving images in large image databases. In this…
Expand
1999
1999
Strain Directed Assembly of Nanoparticle Arrays Within a Semiconductor
C. Hung
,
A. Marshall
,
D. Kim
,
W. D. Nix
,
J. Harris
,
R. Kiehl
1999
Corpus ID: 1072805
The use of strain to direct the assembly of nanoparticle arrays in a semiconductor is investigated experimentally and…
Expand
Highly Cited
1989
Highly Cited
1989
An adaptive MLSE receiver for TDMA digital mobile radio
R. D'Avella
,
Luigi Moreno
,
M. Sant'Agostino
IEEE J. Sel. Areas Commun.
1989
Corpus ID: 12183392
The authors present a simulation study of an adaptive receiver, based on the concept of maximum-likelihood sequence estimation…
Expand
1987
1987
A Channel Access Structure for Wideband ISDN
B. Kraimeche
,
M. Schwartz
IEEE J. Sel. Areas Commun.
1987
Corpus ID: 6161545
To be fully integrated, the Integrated Service Digital Network (ISDN) arena is preparing an evolution from its current narrowband…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE