Results 1 to 10 of about 18,416,188 (285)
With the advancement of information and communication technology (ICT), the medical sector is undergoing a massive transformation. Health records are being digitized, stored remotely in the cloud and shared with different stakeholders.
Kennedy Edemacu +2 more
doaj +2 more sources
Access structures determined by uniform polymatroids
In this article, all multipartite access structures obtained from uniform integer polymatroids were investigated using the method developed by Farràs, Martí-Farré, and Padró. They are matroid ports, i.e., they satisfy the necessary condition to be ideal.
Kawa Renata, Kula Mieczysław
doaj +3 more sources
Structure–efficiency relationship of access group antibiotics via SK chromatic descriptors [PDF]
In graph theory, topological indices play a significant role as numerical descriptors of a graph, helping to summarize the physicochemical properties of a molecular graph.
R. Rajambigai +2 more
doaj +2 more sources
The Access Structure in Learner's Dictionaries*
: Dictionaries have to be compiled in accordance with specific target users and dictionarygoals. User orientation is, however, not the only criterion for measuring the success of adictionary.
M. Steyn
semanticscholar +7 more sources
An Efficient Threshold Access-Structure for RLWE-Based Multiparty Homomorphic Encryption
We propose and implement a multiparty homomorphic encryption (MHE) scheme with a $$t$$ t -out-of- $$N$$ N -threshold access-structure that is efficient and does not require a trusted dealer in the common random string model. We construct this scheme from
C. Mouchet +2 more
semanticscholar +1 more source
Extremal Set Theory and LWE Based Access Structure Hiding Verifiable Secret Sharing with Malicious Majority and Free Verification [PDF]
Secret sharing allows a dealer to distribute a secret among several parties such that only authorized subsets of parties, specified by a (monotone) access structure, can reconstruct the secret.
V. Sehrawat, Foo Yee Yeo, Y. Desmedt
semanticscholar +1 more source
Design of Memory Access Structure for Coarse-Grained Reconfigurable Array with Decoupled Access Execute [PDF]
Coarse-Grained Reconfigurable Array(CGRA) architecture has both flexibility and efficiency,but its characteristics of high computing throughput also brings pressure to memory.In the case of the relative fixed bandwidth of off-chip Dynamic Random Access ...
HONG Tu, JING Naifeng
doaj +1 more source
The accessibility of an access structure [PDF]
Summary: In secret sharing, different access structures have different difficulty degrees for acceding to the secret. We give a numerical measure of how easy or how difficult is to recover the secret, depending only on the structure itself and not on the particular scheme used for realizing it. We derive some consequences.
Carreras, Francesc +2 more
openaire +1 more source
Attribute-based encryption schema with group signatures
Cipher text-policy attribute-based encryption schema(CP-ABE) is widely used in protection of sensitive data. In CP-ABE, When the users access the cipher text, the access structure and the cipher text were sent to the users.
ZHANG Xinglan, CUI Yao
doaj +3 more sources
CP-ABE Scheme Using Selectively Hidden Tree Access Structure [PDF]
Hidden access structure is a secure operation of Ciphertext Policy Attribute Base Encryption(CP-ABE),which can effectively prevent the leakage of sensitive information.However,tree access structure used by existing CP-ABE schemes are either completely ...
HAN Shuyan, Nurmamat Helil
doaj +1 more source

