Results 11 to 20 of about 6,954,298 (295)

Market Structure And Market Access [PDF]

open access: yes, 2007
We examine an issue at the nexus of domestic competition policy and international trade, the interaction between goods trade and market power in domestic trade and distribution sectors. Theory suggests a set of linkages between service-sector competition and goods trade supported by econometrics involving imports of 22 OECD countries vis-´a-vis 69 ...
Francois, Joseph, Wooton, Ian
openaire   +7 more sources

Multi-Receiver Authentication Scheme for General Access Structure

open access: yesIEEE Access, 2020
Authentication is an important primitive of cryptography. With the rapid progress of network communication, the urgent data needs to ensure it integrity and privacy, therefore, the authentication of multi-receiver has a significant impact on the ...
Qiuxia Xu, Chunming Tang, Jingtong Wang
doaj   +1 more source

Ideal secret sharing schemes on graph-based $3$-homogeneous access structures [PDF]

open access: yesTransactions on Combinatorics, 2021
‎The characterization of the ideal access structures is one of the main open problems in secret sharing and is important from both practical and theoretical points of views‎. ‎A graph-based $3-$homogeneous access structure is an access structure in which
Shahrooz Janbaz   +2 more
doaj   +1 more source

Attribute-based encryption scheme against key abuse based on OBDD access structure from lattice

open access: yesTongxin xuebao, 2023
In order to solve the key security problem in attribute-based encryption, a ciphertext policy attribute-based encryption scheme against key abuse was proposed based on the ring learning with error over ring and the access structure of ordered binary ...
Yiliang HAN   +3 more
doaj  

Ideal hierarchical secret sharing schemes [PDF]

open access: yes, 2010
Hierarchical secret sharing is among the most natural generalizations of threshold secret sharing, and it has attracted a lot of attention from the invention of secret sharing until nowadays.
A. Beimel   +30 more
core   +1 more source

Structure of accessibility classes

open access: yesDiscrete & Continuous Dynamical Systems - A, 2020
In this work we deal with partially hyperbolic diffeomorphisms whose central direction is two dimensional. We prove that in general the accessibility classes are immersed manifolds. If, furthermore, the diffeomorphism is dynamically coherent and satisfies certain bunching condition, then the accessibility classes are $C^{1}$ immersed manifolds.
Hertz, Jana Rodriguez   +1 more
openaire   +3 more sources

A characterisation of ideal weighted secret sharing schemes

open access: yesJournal of Mathematical Cryptology, 2015
Beimel, Tassa and Weinreb [SIAM J. Discrete Math. 22 (2008), 360–397] and Farràs and Padró [Lecture Notes in Comput. Sci. 5978, Springer, 2010, 219–236] partially characterised access structures of ideal weighted secret sharing schemes in terms of the ...
Hameed Ali, Slinko Arkadii
doaj   +1 more source

Constructions of some secret sharing schemes based on linear codes [PDF]

open access: yesИзвестия Саратовского университета. Новая серия: Математика. Механика. Информатика
There are perfect and ideal threshold secret sharing schemes, for example, Shamir’s secret sharing  scheme. For the case of general secret sharing schemes with an arbitrary access structure, it is possible to construct a perfect scheme for any
Ratseev, Sergey Mihailovich
doaj   +1 more source

A Critical Look at On Est Ensemble: 852 mots pour comprendre le français du Gabon

open access: yesLexikos, 2012
The book On Est Ensemble: 852 mots pour comprendre le français du Gabon (L. Ditougou, 2009) is an important contribution to the history of French spoken in Gabon. However, this work presents some shortcomings from a metalexicographic point of view. These
Pierre Ondo-Mébiame   +1 more
doaj   +1 more source

An Attribute-Based Encryption Method Using Outsourced Decryption and Hierarchical Access Structure

open access: yesJournal of Telecommunications and Information Technology, 2022
Cloud computing is being rapidly adopted by many organizations from different domains and large amounts of data is stored in the cloud. In order to ensure data security, the attribute-based access control mechanism has been emerging recently as a fine ...
Tabassum N. Mujawar, Lokesh B. Bhajantri
doaj   +1 more source

Home - About - Disclaimer - Privacy