نتایج جستجو برای: threshold access structures

تعداد نتایج: 880041  

2016
Ilan Komargodski Moni Naor Eylon Yogev

Secret sharing schemes allow a dealer to distribute a secret piece of information among several parties so that any qualified subset of parties can reconstruct the secret, while every unqualified subset of parties learns nothing about the secret. The collection of qualified subsets is called an access structure. The best known access structure is the k-threshold one, where any subset of size k ...

2015
Dieudonne Manzi Mugisha Mark R. McLellan

Exploiting Application Behaviors for Resilient Static Random Access Memory Arrays in the Near-Threshold Computing Regime

پایان نامه :وزارت علوم، تحقیقات و فناوری - دانشگاه لرستان - دانشکده ادبیات 1394

abstract the purpose of this study was to find out the effect of applying the principles of group-dynamic assessment (g-da) on learning of conditional structures in english by iranian efl learners at the intermediate level, which according to the formal educational system in iran, includes students who are in their second year of studying in high schools of koohdasht city. this study was a qua...

2004
Nanjangud C. Narendra

With increasing numbers of organizations automating their business processes by using workflow systems, security aspects of workflow systems has become a heavily researched area. Also, most workflow processes nowadays need to be adaptive, i.e., constantly changing, to meet changing business conditions. However, little attention has been paid to integrating Security and Adaptive Workflow. In thi...

Journal: :Computer Networks 2016
Hui Cui Robert H. Deng Junzuo Lai Xun Yi Surya Nepal

A promising solution to protect data privacy in cloud storage services is known as ciphertext-policy attribute-based encryption (CP-ABE). However, in a traditional CP-ABE scheme, a ciphertext is bound with an explicit access structure, which may leak private information about the underlying plaintext in that anyone having access to the ciphertexts can tell the attributes of the privileged recip...

1999
A. Lombardo

The enormous increase in wireless communications has led to the need to configure wireless access networks with cellular structures based on the use of microand picocells. A key issue in connection with this is the rerouting of the data flow directed to a user making a handover. The paper considers one of the most widely-used connectionless protocols, the SNL, which is based on a tree-structure...

2016
Feng wang Lei Cui Yizhen Wang Xinjiang Wei Yan Tai

Role based access control (RBAC) has been widely adopted in industrial and government. However RBAC is only suitable for closed enterprise environment. With modern Internet based application, collaboration and sharing among multiple organizations become essential and RBAC is no longer sufficient. Role mapping has been the solutions to deal with multiple domains, where the roles in the hierarchy...

Journal: :journal of biomedical physics and engineering 0
a javadpour neuroscience research center, baqiyatallah university of medical sciences, tehran, iran. a mohammadi neuroscience research center, baqiyatallah university of medical sciences, tehran, iran.سازمان اصلی تایید شده: دانشگاه علوم پزشکی بقیه الله (baqiyatallah university of medical sciences)

normal 0 false false false en-us x-none fa background: electroencephalography (eeg) has vital and significant applications in different medical fields and is used for the primary evaluation of neurological disorders. hence, having easy access to suitable and useful signal is very important. artifacts are undesirable confusions which are generally originated from inevitable human activities such...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید