Results 11 to 20 of about 18,416,188 (285)
A General Lexicographic Model for a Typological Variety of Dictionaries in African Languages
So far, there have been few descriptions on creating structures capable of storing lexi-cographic data, ISO 24613:2008 being one of the latest. Another one is by Spohr (2012), who designs a multifunctional lexical resource which is able to store data of ...
Gertrud Faaß +2 more
doaj +1 more source
Market Structure And Market Access [PDF]
We examine an issue at the nexus of domestic competition policy and international trade, the interaction between goods trade and market power in domestic trade and distribution sectors. Theory suggests a set of linkages between service-sector competition and goods trade supported by econometrics involving imports of 22 OECD countries vis-´a-vis 69 ...
Francois, Joseph, Wooton, Ian
openaire +7 more sources
Multi-Receiver Authentication Scheme for General Access Structure
Authentication is an important primitive of cryptography. With the rapid progress of network communication, the urgent data needs to ensure it integrity and privacy, therefore, the authentication of multi-receiver has a significant impact on the ...
Qiuxia Xu, Chunming Tang, Jingtong Wang
doaj +1 more source
Ideal secret sharing schemes on graph-based $3$-homogeneous access structures [PDF]
The characterization of the ideal access structures is one of the main open problems in secret sharing and is important from both practical and theoretical points of views. A graph-based $3-$homogeneous access structure is an access structure in which
Shahrooz Janbaz +2 more
doaj +1 more source
Attribute-based encryption scheme against key abuse based on OBDD access structure from lattice
In order to solve the key security problem in attribute-based encryption, a ciphertext policy attribute-based encryption scheme against key abuse was proposed based on the ring learning with error over ring and the access structure of ordered binary ...
Yiliang HAN +3 more
doaj
In ciphertext-policy attribute-based encryption (CP-ABE) schemes, the computational overhead and the length for the ciphertext are positively correlated with the complexity of the access structure. In addition, the access structure embedded in ciphertext
Yicheng Zhang, Jiguo Li, Hao Yan
semanticscholar +1 more source
Structure of accessibility classes
In this work we deal with partially hyperbolic diffeomorphisms whose central direction is two dimensional. We prove that in general the accessibility classes are immersed manifolds. If, furthermore, the diffeomorphism is dynamically coherent and satisfies certain bunching condition, then the accessibility classes are $C^{1}$ immersed manifolds.
Hertz, Jana Rodriguez +1 more
openaire +3 more sources
A characterisation of ideal weighted secret sharing schemes
Beimel, Tassa and Weinreb [SIAM J. Discrete Math. 22 (2008), 360–397] and Farràs and Padró [Lecture Notes in Comput. Sci. 5978, Springer, 2010, 219–236] partially characterised access structures of ideal weighted secret sharing schemes in terms of the ...
Hameed Ali, Slinko Arkadii
doaj +1 more source
Constructions of some secret sharing schemes based on linear codes [PDF]
There are perfect and ideal threshold secret sharing schemes, for example, Shamir’s secret sharing scheme. For the case of general secret sharing schemes with an arbitrary access structure, it is possible to construct a perfect scheme for any
Ratseev, Sergey Mihailovich
doaj +1 more source
An Attribute-Based Encryption Method Using Outsourced Decryption and Hierarchical Access Structure
Cloud computing is being rapidly adopted by many organizations from different domains and large amounts of data is stored in the cloud. In order to ensure data security, the attribute-based access control mechanism has been emerging recently as a fine ...
Tabassum N. Mujawar, Lokesh B. Bhajantri
doaj +1 more source

