نتایج جستجو برای: threshold access structures
تعداد نتایج: 880041 فیلتر نتایج به سال:
This paper presents an ongoing work toward the proposal of the new concept of the attribute-based cryptosystem. In SCN2010, Gagné, Narayan, and Safavi-Naini proposed attribute-based signcryption (ABSC) with threshold structure. As in ciphertext-policy attribute-based encryption (CP-ABE), an encryptor can specify the access structure of decryptors, and as in attribute-based signature (ABS), each...
abstractthe liquid crystal director distribution is determined for a confined chiral nematic slab. the molecular director distribution of the field-controlled chiral nematic slab is directly calculated. the director profiles for the tilt and the twist angles, under different applied fields, are calculated in the slab with weak boundary conditions. then, the dependence of the threshold field on ...
Abstract. Cancer is a major health problem all over the world. Photo thermal therapy (PTT) is a non-invasive method in cancer treatment. In PTT, the laser light usually in near-infra red region is absorbed and converted to heat in the cancerous tissue. The temperature above 40 ° C in PTT can induce some effects including irreversible damage to proteins, changes in enzyme struc...
In this paper interference management in co-channel deployment of macrocell and cognitive femtocells is investigated. For the purpose of the aggregate interference mitigation from all femtocell access points (FAP) to macrocell user equipment (MUE) and the purpose to increase the radio link quality of femtocell system, a parameter named interference tolerable threshold (Ith) is introduced, the a...
regarding the important role of health in economic growth and development, the purpose of the present paper is to investigate the impact of life expectancy, as the most important indicator of health, on economic growth in iran during 1965-2009. the estimated smooth transition regression (str) model supports a nonlinear threshold behavior in the relationship between life expectancy and economic ...
Abstract We propose and implement a multiparty homomorphic encryption (MHE) scheme with $$t$$ t -out-of- $$N$$ N -threshold access-structure that is efficient does not require trusted dealer in the common random string model. construct this from ring-learning-with-error assumptions as an exte...
We study numerically the mean access times for random walks on hybrid disordered structures formed by embedding scale-free networks into regular lattices, considering different transition rates for steps across lattice bonds (F ) and across network shortcuts (f ). For fast shortcuts (f/F 1) and low shortcut densities, traversal time data collapse onto a universal curve, while a crossover behavi...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید