نتایج جستجو برای: threshold access structures
تعداد نتایج: 880041 فیلتر نتایج به سال:
A visual cryptography scheme for a set P of n participants is a method to encode a secret image SI into n shadow images called shares, where each participant in P receives one share. Certain quali ed subsets of participants can \visually" recover the secret image, but other, forbidden, sets of participants have no information (in an information-theoretic sense) on SI . A \visual" recovery for a...
In traditional secret sharing schemes for general access structures, a secret can be encoded into n sets of (shadow, key)’s which are distributed to n participants one by one. Only those participants belonging to a pre-defined qualified subset can recover the shared secret by using their (shadow, key)’s. The size of (shadow, key)’s may be different for different participants. This problem exist...
Article history: Received 23 July 2011 Received in revised form 13 March 2013 Accepted 25 March 2013 Available online 2 April 2013
The asymmetry of heat conduction in thermal diodes is attributed to the regulation logic circuits, control devices, etc. Currently, rectification however, are constrained by either specific on/off switching thresholds, or low sensitivity manufacturing errors, as well restrictions for roughness and material characteristics. Here, a diode based on fractal structures (inverted tapered branch chann...
The Resolutions of the Dutch States General (1576–1796) is an archive covering over two centuries decision making and consists a heterogeneous series handwritten printed documents. archive, which has recently been digitised, rich source for historical research. However, owing to archive’s heterogeneity dispersion information, historians other researchers find it hard use their In this article, ...
نمودار تعداد نتایج جستجو در هر سال
با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید