• 沒有找到結果。

[PDF] Top 20 An efficient construction of perfect secret sharing schemes for graph-based structures

Has 10000 "An efficient construction of perfect secret sharing schemes for graph-based structures" found on our website. Below are the top 20 most common "An efficient construction of perfect secret sharing schemes for graph-based structures".

An efficient construction of perfect secret sharing schemes for graph-based structures

An efficient construction of perfect secret sharing schemes for graph-based structures

... Brick- ell and Stinson studied a perfect secret sharing scheme for a graph-based structure where the monotone-increasing access structure F contains the pairs of p[r] ... See full document

7

Secret sharing schemes for graph-based prohibited structures

Secret sharing schemes for graph-based prohibited structures

... Brickell and Stinson [5] studied a perfect secret sharing scheme for graph-based access structure F where the monotone-increasing access structure F contains the pairs of partic[r] ... See full document

10

Constructing perfect secret sharing schemes for general and uniform access structures

Constructing perfect secret sharing schemes for general and uniform access structures

... A perfect secret sharing scheme allows a secret K to be shared among a set of partici- pants in such a way that only qualified subsets of participants can recover the ... See full document

11

The exact values of the optimal average information ratio of perfect secret-sharing schemes for tree-based access structures

The exact values of the optimal average information ratio of perfect secret-sharing schemes for tree-based access structures

... A perfect secret-sharing scheme is a method of distributing a secret among a set of participants such that only qualified subsets of participants can recover the ... See full document

10

New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structures

New bounds on the average information rate of secret-sharing schemes for graph-based weighted threshold access structures

... threshold secret-sharing ...in an organization. A set of participants is in the access structure if and only if the sum of the weights of all participants in the set is not less ... See full document

12

Recursive constructions for perfect secret sharing schemes

Recursive constructions for perfect secret sharing schemes

... Perfect Secret Sharing Schemes 89 In this paper, we propose some recursive constructions for perfect secret sharing schemes with access structures of constant rank.. Sti[r] ... See full document

10

An Efficient Probability-based t out of n Secret Image Sharing Scheme

An Efficient Probability-based t out of n Secret Image Sharing Scheme

... concept of visual ...the secret pixels to blocks. As a result, the size of the secret image becomes larger, and the quality of the expanded secret image becomes ...visual ... See full document

1

An Efficient Graph-Based Algorithm for ESD Current Path Analysis

An Efficient Graph-Based Algorithm for ESD Current Path Analysis

... Dean of the College of Electrical and Computer Engineering, National Taiwan University of Science and Technol- ogy, ...Department of Electrical Engineering, National Taiwan University, where ... See full document

13

A Study of Bit-level Processing Based on Color  Imagines of Hierarchical Multiple Visual Secret Sharing Schemes and Applications

A Study of Bit-level Processing Based on Color Imagines of Hierarchical Multiple Visual Secret Sharing Schemes and Applications

... scheme was first proposed by Naor and Shamir in 1994; many secret sharing schemes were published afterward; one of them, the color images of hierarchical multiple visual secret shari[r] ... See full document

15

An Efficient Perfect Algorithm for Memory Repair Problems

An Efficient Perfect Algorithm for Memory Repair Problems

... Traditional perfect algorithms are comparison-based exhaustive search algorithms and are not efficient enough for complex ...deficiency of performance, a new algorithm has been devised ... See full document

8

A Generalized Secret Sharing Scheme Realizing Ordered Access Structures

A Generalized Secret Sharing Scheme Realizing Ordered Access Structures

... generalized secret sharing scheme that realizes an ordered access structure, in which the participants of a qualified subset can reconstruct the shared secret only if they follow the ... See full document

3

Sharing Secret Image Based on Bit Plane

Sharing Secret Image Based on Bit Plane

... a secret sharing technique by encrypting m successively pixels to remove the problem of pixel ...density of the net dots to simulate a gray-level image is introduced into their ...halftone ... See full document

6

On the (2,2) Visual Multi-Secret Sharing Schemes

On the (2,2) Visual Multi-Secret Sharing Schemes

... concept of visual secret sharing (VSS) scheme was first proposed by Noar and Shamir in ...a secret image into several meaningless images, called shadows, such that certain qualified subsets ... See full document

8

Perfect Hashing Schemes for Mining Association Rules

Perfect Hashing Schemes for Mining Association Rules

... Hashing schemes are widely used to improve the performance of data mining association rules, as in the DHP algorithm that utilizes the hash table in identifying the validity of candidate itemsets ... See full document

1

Perfect Hashing Schemes for Mining Traversal Patterns

Perfect Hashing Schemes for Mining Traversal Patterns

... Hashing schemes are a common technique to improve the performance in mining not only association rules but also sequential patterns or traversal ...hash schemes may result in severe performance ...propose ... See full document

2

A Server-aided Signature Scheme Based on Secret Sharing for Mobile Commerce

A Server-aided Signature Scheme Based on Secret Sharing for Mobile Commerce

... progress of the mobile communication technology and the popularity of the handheld de- vices, mobile commerce is of great importance ...tion of users and the non-repudiation of ... See full document

10

A Multi-Use Secure and Efficient Multi-Secret Images Sharing Scheme for General Access Structure

A Multi-Use Secure and Efficient Multi-Secret Images Sharing Scheme for General Access Structure

... 一、 、 、 、簡介 簡介 簡介 簡介 隨著網路的蓬勃發展,人們愈來愈依賴網路 來傳播資訊,但在傳遞機密資料的過程中,機密 資料若被惡意的攻擊者所擷取,則會導致企業嚴 重的損失或是國家安全遭受威脅。因此,資料傳 輸的安全性也愈來愈受重視。為了保護機密資料 洩漏的問題,機密資料的擁有者常事先將資料進 行加密,再傳送之。之後,即使傳送中的資料被 竊取,仍無法得知機密資料的任何相關資訊。在 1979 年, Blakley [2] 和 ... See full document

9

An Efficient Learning Model for Mobile Environments using Graph and Probability Analysis

An Efficient Learning Model for Mobile Environments using Graph and Probability Analysis

... Recently, wireless networks have become extremely popular, with access points becoming available at phenomenal rates. Mobile users are now able to demand access to content almost anywhere they want. The recent ... See full document

6

A Scheme for Threshold Multi-Secret Sharing

A Scheme for Threshold Multi-Secret Sharing

... Scheme for Threshold Multi-Secret Sharing 作者: Chan, ...structure;Basis of access structure;The Chinese remainder theorem;Distinctness;Entropy;Idealness;Multi-secret sharing ... See full document

1

Secret Sharing with Steganographic Effects for HTML Documents

Secret Sharing with Steganographic Effects for HTML Documents

... parts of a secret HTML document are the components that can be displayed or be accessed on browsers, it is proposed in this study to share these components among participants of the secret ... See full document

7

Show all 10000 documents...