نتایج جستجو برای: threshold access structures
تعداد نتایج: 880041 فیلتر نتایج به سال:
In this paper a new SRAM cell is designed with a body bias controller to control leakage, speed and stability. A novel controller circuit is proposed to control the value of threshold voltage. Operation of the proposed controller is based on word line signal levels. In order to reduce sub threshold leakage current, the NMOS access and driver transistor is adjusted to a higher threshold voltage....
It is well-known that the linear secret-sharing scheme (LSSS) can be constructed from linear error-correcting codes (Brickell [1], R.J. McEliece and D.V.Sarwate [2],Cramer, el.,[3]). The theory of linear codes from algebraic-geometric curves (algebraic-geometric (AG) codes or geometric Goppa code) has been well-developed since the work of V.Goppa and Tsfasman, Vladut, and Zink( see [17], [18] a...
Several types of micro-controllers are put into a primordial soup abstracted as a ring. The special feature of this setup is that self-replication is not possible. Microcontrollers only have access to foreign program-code not to their own. It turns out that the seeding programs vanish long before being able to proliferate when each program is automatically granted access to the neighboring code...
This paper presents a call admission control (CAC) algorithm that aids in the Quality of Service (QoS) support in a wireless network base station. The Threshold Access Sharing (TAS) scheme provides improved performance over generalized methods of current CAC algorithms. The TAS algorithm relies on a prioritization of admitted traffic through bandwidth thresholds. This is particularly vital for ...
A distributed key generation (DKG) protocol is a central component in distributed cryptosystems. It allows a group of participants to jointly generate a pair of keys (private key and public key) without assuming any trusted participant. The public key is output in clear but only authorised subgroups of participants are able to reconstruct or use the private key. Existing literature on DKG proto...
A hierarchical threshold secret image sharing (HTSIS) scheme is a method to share a secret image among a set of participants with different levels of authority. Recently, Guo et al. (2012) [22] proposed a HTSIS scheme based on steganography and Birkhoff interpolation. However, their scheme does not provide the required secrecy needed for HTSIS schemes so that some non-authorized subsets of part...
When a flashed stimulus is followed by a backward mask, subjects fail to perceive it unless the target-mask interval exceeds a threshold duration of about 50 ms. Models of conscious access postulate that this threshold is associated with the time needed to establish sustained activity in recurrent cortical loops, but the brain areas involved and their timing remain debated. We used high-density...
There has been for several years a growing interest in defining new access control models and administration facilities for these models. Several models have observed that only structuring the model using the concept of roles as in RBAC is not sufficient to administer decentralized enterprises. These models have suggested to consider new concepts such as organization (as in OrBAC) or domain (as...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید