• 沒有找到結果。

[PDF] Top 20 Constructing perfect secret sharing schemes for general and uniform access structures

Has 10000 "Constructing perfect secret sharing schemes for general and uniform access structures" found on our website. Below are the top 20 most common "Constructing perfect secret sharing schemes for general and uniform access structures".

Constructing perfect secret sharing schemes for general and uniform access structures

Constructing perfect secret sharing schemes for general and uniform access structures

... 1986 and 1991, ...Science and Informa- tion Engineering, National Chiao Tung ...design and implementation of the B2 Secure XENIX for IBM, Federal Sector Division, Gaithersburg, Maryland, ... See full document

11

An efficient construction of perfect secret sharing schemes for graph-based structures

An efficient construction of perfect secret sharing schemes for graph-based structures

... Brick- ell and Stinson studied a perfect secret sharing scheme for a graph-based structure where the monotone-increasing access structure F contains the pairs of p[r] ... See full document

7

The exact values of the optimal average information ratio of perfect secret-sharing schemes for tree-based access structures

The exact values of the optimal average information ratio of perfect secret-sharing schemes for tree-based access structures

... A perfect secret-sharing scheme is a method of distributing a secret among a set of participants such that only qualified subsets of participants can recover the secret and the ... See full document

10

Secret sharing schemes for graph-based prohibited structures

Secret sharing schemes for graph-based prohibited structures

... Brickell and Stinson [5] studied a perfect secret sharing scheme for graph-based access structure F where the monotone-increasing access structure F contains the pairs of partic[r] ... See full document

10

New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structures

New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structures

... a general k-weighted graph W(a 1 , - ...2 and H 0 j be the graphs defined in the same ways as B l , M l 1 ;l 2 and H j respectively, except that a i ’s and c j ’s involved are all set to be ... See full document

12

Recursive constructions for perfect secret sharing schemes

Recursive constructions for perfect secret sharing schemes

... Perfect Secret Sharing Schemes 89 In this paper, we propose some recursive constructions for perfect secret sharing schemes with access structures of constant rank.. Sti[r] ... See full document

10

A Generalized Secret Sharing Scheme Realizing Ordered Access Structures

A Generalized Secret Sharing Scheme Realizing Ordered Access Structures

... generalized secret sharing scheme that realizes an ordered access structure, in which the participants of a qualified subset can reconstruct the shared secret only if they follow the sequence ... See full document

3

A Multi-Use Secure and Efficient Multi-Secret Images Sharing Scheme for General Access Structure

A Multi-Use Secure and Efficient Multi-Secret Images Sharing Scheme for General Access Structure

... 一、 、 、 、簡介 簡介 簡介 簡介 隨著網路的蓬勃發展,人們愈來愈依賴網路 來傳播資訊,但在傳遞機密資料的過程中,機密 資料若被惡意的攻擊者所擷取,則會導致企業嚴 重的損失或是國家安全遭受威脅。因此,資料傳 輸的安全性也愈來愈受重視。為了保護機密資料 洩漏的問題,機密資料的擁有者常事先將資料進 行加密,再傳送之。之後,即使傳送中的資料被 竊取,仍無法得知機密資料的任何相關資訊。在 1979 年, Blakley [2] 和 ... See full document

9

On the (2,2) Visual Multi-Secret Sharing Schemes

On the (2,2) Visual Multi-Secret Sharing Schemes

... visual secret sharing (VSS) scheme was first proposed by Noar and Shamir in ...a secret image into several meaningless images, called shadows, such that certain qualified subsets of shadows ... See full document

8

Perfect Hashing Schemes for Mining Association Rules

Perfect Hashing Schemes for Mining Association Rules

... Hashing schemes are widely used to improve the performance of data mining association rules, as in the DHP algorithm that utilizes the hash table in identifying the validity of candidate itemsets according to the ... See full document

1

Perfect Hashing Schemes for Mining Traversal Patterns

Perfect Hashing Schemes for Mining Traversal Patterns

... Hashing schemes are a common technique to improve the performance in mining not only association rules but also sequential patterns or traversal ...hash schemes may result in severe performance ...propose ... See full document

2

Testable Design and BIST Schemes for FIR Filter Structures

Testable Design and BIST Schemes for FIR Filter Structures

... design and built-in self-test schemes for FIR ...filter and faulty effects can be propagated to the primary ...counter and the output response analyzer is implemented with a checksum ... See full document

4

Secret image sharing with steganography and authentication

Secret image sharing with steganography and authentication

... 題名: Secret image sharing with steganography and authentication 作者: ...關鍵詞: Secret image sharing;Steganography;Authentication;Camouflage image;Data hiding;Stego-image;Fragile ... See full document

1

Secret image sharing with steganography and authentication

Secret image sharing with steganography and authentication

... to secret image sharing based on a ðk; nÞ-threshold scheme with the additional capabilities of steganography and authentication is ...A secret image is first processed into n shares which are ... See full document

10

A Study of Bit-level Processing Based on Color  Imagines of Hierarchical Multiple Visual Secret Sharing Schemes and Applications

A Study of Bit-level Processing Based on Color Imagines of Hierarchical Multiple Visual Secret Sharing Schemes and Applications

... scheme was first proposed by Naor and Shamir in 1994; many secret sharing schemes were published afterward; one of them, the color images of hierarchical multiple visual secret shari[r] ... See full document

15

A Scheme for Threshold Multi-Secret Sharing

A Scheme for Threshold Multi-Secret Sharing

... Scheme for Threshold Multi-Secret Sharing 作者: Chan, ...關鍵詞: Access structure;Basis of access structure;The Chinese remainder theorem;Distinctness;Entropy;Idealness;Multi-secret ... See full document

1

Secret Sharing with Steganographic Effects for HTML Documents

Secret Sharing with Steganographic Effects for HTML Documents

... a secret HTML document are the components that can be displayed or be accessed on browsers, it is proposed in this study to share these components among participants of the secret HTML document by the ... See full document

7

Sharing and hiding secret images with size constraint

Sharing and hiding secret images with size constraint

... the sharing phase in ...the secret image) must also be ...developed for narrowing the range of gray values of the secret ...the secret image using two types of blocks, producing a ... See full document

9

New Visual Secret Sharing Schemes With Non-Expansible Shadow Size Using Non-binary Sub Pixel

New Visual Secret Sharing Schemes With Non-Expansible Shadow Size Using Non-binary Sub Pixel

... 0 and C 1 consisting of n λ and n γ n × 1 matrices, ...When sharing a white ...), and then randomly selects one row of this column matrix to a relative ... See full document

12

Discrete particle swarm optimization for constructing uniform design on irregular regions

Discrete particle swarm optimization for constructing uniform design on irregular regions

... M: folding mirror; L1, L2: mode-matching lenses; PL: pump lens; DC: dichroic curve mirror (R=10 cm); DCM1, DCM3: flat double chirped mirrors; DCM2, DCM4: curved double chirped mirrors (R[r] ... See full document

3

Show all 10000 documents...