Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 228,393,518 papers from all fields of science
Search
Sign In
Create Free Account
Access structure
Access structures are used in the study of security system where multiple parties need to work together to obtain a resource. Groups of parties that…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
7 relations
Access control
Cryptography
Digital signature
Secret sharing
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2015
2015
Bounds for generalized Hamming weights of general AG codes
Kwankyu Lee
Finite Fields Their Appl.
2015
Corpus ID: 38868819
2014
2014
A CP-ABE scheme with system attributes revocation in cloud storage
Anping Xiong
,
Chunxiang Xu
,
Qi-Xian Gan
11th International Computer Conference on Wavelet…
2014
Corpus ID: 15558291
Attribute Based Encryption (CP-ABE) access control schemes has become a heated topic area in security since it is more suitable…
Expand
2013
2013
SECURE VISUAL CRYPTOGRAPHY
R. Yadagiri
,
Rao Assoc Professor
,
R. Swetha
,
Paritala Ramanjaneyulu
2013
Corpus ID: 14685925
: - An effective and secure protection of sensitive information is the primary concerned in Communication systems or network…
Expand
2010
2010
Secret sharing schemes from binary linear codes
Zhihui Li
,
Ting Xue
,
Hong Lai
Information Sciences
2010
Corpus ID: 44896162
2005
2005
Distributing the Encryption and Decryption of a Block Cipher
K. Martin
,
R. Safavi-Naini
,
Huaxiong Wang
,
P. Wild
Des. Codes Cryptogr.
2005
Corpus ID: 12868905
In threshold cryptography, the goal is to distribute the computation of basic cryptographic primitives across a number of nodes…
Expand
2004
2004
Efficient 1-out-of-n oblivious transfer schemes with universally usable parameters
Wen-Guey Tzeng
IEEE transactions on computers
2004
Corpus ID: 35629278
We propose efficient and secure (string) oblivious transfer (OT/sup 1//sub n/) schemes for any n/spl ges/2. We build our OT/sup 1…
Expand
2000
2000
Content-Based Image Retrieval Using Binary Signatures
Vishal Chitkara
,
Mario A Nascimento
,
Curt Mastaller
2000
Corpus ID: 18821525
Significant research has focused on determining efficient me thodologies for retrieving images in large image databases. In this…
Expand
1999
1999
Strain Directed Assembly of Nanoparticle Arrays Within a Semiconductor
C. Hung
,
A. Marshall
,
D. Kim
,
W. D. Nix
,
J. Harris
,
R. Kiehl
1999
Corpus ID: 1072805
The use of strain to direct the assembly of nanoparticle arrays in a semiconductor is investigated experimentally and…
Expand
Review
1993
Review
1993
A Cognitive Dimensional Analysis of Idea Sketches
C. C. Wood
,
Rank Xerox Cambridge
1993
Corpus ID: 14841255
In this paper Green's (1989) notion of "cognitive dimensions" is used to consider the properties of notations and media for…
Expand
Highly Cited
1989
Highly Cited
1989
An adaptive MLSE receiver for TDMA digital mobile radio
R. D'Avella
,
Luigi Moreno
,
M. Sant'Agostino
IEEE J. Sel. Areas Commun.
1989
Corpus ID: 12183392
The authors present a simulation study of an adaptive receiver, based on the concept of maximum-likelihood sequence estimation…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE