نتایج جستجو برای: threshold access structures

تعداد نتایج: 880041  

Journal: :Electronic Colloquium on Computational Complexity (ECCC) 1996
Giuseppe Ateniese Carlo Blundo Alfredo De Santis Douglas R. Stinson

A visual cryptography scheme for a set P of n participants is a method to encode a secret image SI into n shadow images called shares, where each participant in P receives one share. Certain quali ed subsets of participants can \visually" recover the secret image, but other, forbidden, sets of participants have no information (in an information-theoretic sense) on SI . A \visual" recovery for a...

2008
Shyong Jian Shyu Ying-Ru Chen

In traditional secret sharing schemes for general access structures, a secret can be encoded into n sets of (shadow, key)’s which are distributed to n participants one by one. Only those participants belonging to a pre-defined qualified subset can recover the shared secret by using their (shadow, key)’s. The size of (shadow, key)’s may be different for different participants. This problem exist...

Journal: :Inf. Sci. 2013
Hui-Chuan Lu Hung-Lin Fu

Article history: Received 23 July 2011 Received in revised form 13 March 2013 Accepted 25 March 2013 Available online 2 April 2013

Journal: :Advanced Functional Materials 2021

The asymmetry of heat conduction in thermal diodes is attributed to the regulation logic circuits, control devices, etc. Currently, rectification however, are constrained by either specific on/off switching thresholds, or low sensitivity manufacturing errors, as well restrictions for roughness and material characteristics. Here, a diode based on fractal structures (inverted tapered branch chann...

Journal: :Journal on computing and cultural heritage 2023

The Resolutions of the Dutch States General (1576–1796) is an archive covering over two centuries decision making and consists a heterogeneous series handwritten printed documents. archive, which has recently been digitised, rich source for historical research. However, owing to archive’s heterogeneity dispersion information, historians other researchers find it hard use their In this article, ...

Journal: :International Journal of Computer Applications 2014

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید