Results 11 to 20 of about 18,416,188 (285)

A General Lexicographic Model for a Typological Variety of Dictionaries in African Languages

open access: yesLexikos, 2014
So far, there have been few descriptions on creating structures capable of storing lexi-cographic data, ISO 24613:2008 being one of the latest. Another one is by Spohr (2012), who designs a multifunctional lexical resource which is able to store data of ...
Gertrud Faaß   +2 more
doaj   +1 more source

Market Structure And Market Access [PDF]

open access: yes, 2007
We examine an issue at the nexus of domestic competition policy and international trade, the interaction between goods trade and market power in domestic trade and distribution sectors. Theory suggests a set of linkages between service-sector competition and goods trade supported by econometrics involving imports of 22 OECD countries vis-´a-vis 69 ...
Francois, Joseph, Wooton, Ian
openaire   +7 more sources

Multi-Receiver Authentication Scheme for General Access Structure

open access: yesIEEE Access, 2020
Authentication is an important primitive of cryptography. With the rapid progress of network communication, the urgent data needs to ensure it integrity and privacy, therefore, the authentication of multi-receiver has a significant impact on the ...
Qiuxia Xu, Chunming Tang, Jingtong Wang
doaj   +1 more source

Ideal secret sharing schemes on graph-based $3$-homogeneous access structures [PDF]

open access: yesTransactions on Combinatorics, 2021
‎The characterization of the ideal access structures is one of the main open problems in secret sharing and is important from both practical and theoretical points of views‎. ‎A graph-based $3-$homogeneous access structure is an access structure in which
Shahrooz Janbaz   +2 more
doaj   +1 more source

Attribute-based encryption scheme against key abuse based on OBDD access structure from lattice

open access: yesTongxin xuebao, 2023
In order to solve the key security problem in attribute-based encryption, a ciphertext policy attribute-based encryption scheme against key abuse was proposed based on the ring learning with error over ring and the access structure of ordered binary ...
Yiliang HAN   +3 more
doaj  

Constant Size Ciphertext Distributed CP-ABE Scheme With Privacy Protection and Fully Hiding Access Structure

open access: yesIEEE Access, 2019
In ciphertext-policy attribute-based encryption (CP-ABE) schemes, the computational overhead and the length for the ciphertext are positively correlated with the complexity of the access structure. In addition, the access structure embedded in ciphertext
Yicheng Zhang, Jiguo Li, Hao Yan
semanticscholar   +1 more source

Structure of accessibility classes

open access: yesDiscrete & Continuous Dynamical Systems - A, 2020
In this work we deal with partially hyperbolic diffeomorphisms whose central direction is two dimensional. We prove that in general the accessibility classes are immersed manifolds. If, furthermore, the diffeomorphism is dynamically coherent and satisfies certain bunching condition, then the accessibility classes are $C^{1}$ immersed manifolds.
Hertz, Jana Rodriguez   +1 more
openaire   +3 more sources

A characterisation of ideal weighted secret sharing schemes

open access: yesJournal of Mathematical Cryptology, 2015
Beimel, Tassa and Weinreb [SIAM J. Discrete Math. 22 (2008), 360–397] and Farràs and Padró [Lecture Notes in Comput. Sci. 5978, Springer, 2010, 219–236] partially characterised access structures of ideal weighted secret sharing schemes in terms of the ...
Hameed Ali, Slinko Arkadii
doaj   +1 more source

Constructions of some secret sharing schemes based on linear codes [PDF]

open access: yesИзвестия Саратовского университета. Новая серия: Математика. Механика. Информатика
There are perfect and ideal threshold secret sharing schemes, for example, Shamir’s secret sharing  scheme. For the case of general secret sharing schemes with an arbitrary access structure, it is possible to construct a perfect scheme for any
Ratseev, Sergey Mihailovich
doaj   +1 more source

An Attribute-Based Encryption Method Using Outsourced Decryption and Hierarchical Access Structure

open access: yesJournal of Telecommunications and Information Technology, 2022
Cloud computing is being rapidly adopted by many organizations from different domains and large amounts of data is stored in the cloud. In order to ensure data security, the attribute-based access control mechanism has been emerging recently as a fine ...
Tabassum N. Mujawar, Lokesh B. Bhajantri
doaj   +1 more source

Home - About - Disclaimer - Privacy