Results 1 to 10 of about 6,954,298 (295)

Access structures determined by uniform polymatroids

open access: yesJournal of Mathematical Cryptology, 2023
In this article, all multipartite access structures obtained from uniform integer polymatroids were investigated using the method developed by Farràs, Martí-Farré, and Padró. They are matroid ports, i.e., they satisfy the necessary condition to be ideal.
Kawa Renata, Kula Mieczysław
doaj   +3 more sources

Structure identification and state initialization of spin networks with limited access

open access: yesNew Journal of Physics, 2014
For reliable and consistent quantum information processing carried out on a quantum network, the network structure must be fully known and a desired initial state must be accurately prepared on it.
Yuzuru Kato, Naoki Yamamoto
doaj   +2 more sources

Structure–efficiency relationship of access group antibiotics via SK chromatic descriptors [PDF]

open access: yesFrontiers in Chemistry
In graph theory, topological indices play a significant role as numerical descriptors of a graph, helping to summarize the physicochemical properties of a molecular graph.
R. Rajambigai   +2 more
doaj   +2 more sources

Design of Memory Access Structure for Coarse-Grained Reconfigurable Array with Decoupled Access Execute [PDF]

open access: yesJisuanji gongcheng, 2021
Coarse-Grained Reconfigurable Array(CGRA) architecture has both flexibility and efficiency,but its characteristics of high computing throughput also brings pressure to memory.In the case of the relative fixed bandwidth of off-chip Dynamic Random Access ...
HONG Tu, JING Naifeng
doaj   +1 more source

The accessibility of an access structure [PDF]

open access: yesRAIRO - Theoretical Informatics and Applications, 2006
Summary: In secret sharing, different access structures have different difficulty degrees for acceding to the secret. We give a numerical measure of how easy or how difficult is to recover the secret, depending only on the structure itself and not on the particular scheme used for realizing it. We derive some consequences.
Carreras, Francesc   +2 more
openaire   +1 more source

Attribute-based encryption schema with group signatures

open access: yes网络与信息安全学报, 2019
Cipher text-policy attribute-based encryption schema(CP-ABE) is widely used in protection of sensitive data. In CP-ABE, When the users access the cipher text, the access structure and the cipher text were sent to the users.
ZHANG Xinglan, CUI Yao
doaj   +3 more sources

CP-ABE Scheme Using Selectively Hidden Tree Access Structure [PDF]

open access: yesJisuanji gongcheng, 2020
Hidden access structure is a secure operation of Ciphertext Policy Attribute Base Encryption(CP-ABE),which can effectively prevent the leakage of sensitive information.However,tree access structure used by existing CP-ABE schemes are either completely ...
HAN Shuyan, Nurmamat Helil
doaj   +1 more source

Azimuthal Asymmetries: Access to Novel Structure Functions [PDF]

open access: yes, 2002
One of the most interesting consequence of non-zero intrinsic transverse momentum of partons in the nucleon is the nontrivial azimuthal dependence of the cross section of hard scattering processes.
Asilyan, L. S.   +3 more
core   +2 more sources

Distributed Structure: Joint Expurgation for the Multiple-Access Channel [PDF]

open access: yes, 2012
In this work we show how an improved lower bound to the error exponent of the memoryless multiple-access (MAC) channel is attained via the use of linear codes, thus demonstrating that structure can be beneficial even in cases where there is no capacity ...
Erez, Uri, Haim, Eli, Kochman, Yuval
core   +1 more source

A General Lexicographic Model for a Typological Variety of Dictionaries in African Languages

open access: yesLexikos, 2014
So far, there have been few descriptions on creating structures capable of storing lexi-cographic data, ISO 24613:2008 being one of the latest. Another one is by Spohr (2012), who designs a multifunctional lexical resource which is able to store data of ...
Gertrud Faaß   +2 more
doaj   +1 more source

Home - About - Disclaimer - Privacy