• No results found

Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting CNF Access Policy

N/A
N/A
Protected

Academic year: 2020

Share "Private Ciphertext-Policy Attribute-based Encryption Schemes With Constant-Size Ciphertext Supporting CNF Access Policy"

Copied!
15
0
0

Loading.... (view fulltext now)

Full text

Loading

References

Related documents

The dividend payers tend to follow the free cash flow theory as indicate by size, return on assets, retained earnings to total assets, debt to assets ratio price to book

The outstation requires intelligent KETS telephone unit(s) to interface to the line pair at the particular level crossing via a Kestrel Line Termination Unit.. The complete KETS

If in Emergency Priority Mode, the LSS will provide dial tone to Port 1, and the user must dial one of the programmed emergency numbers to gain access to the central office line..

We present a machine-learning approach using freely available software for analysing imperfect reconstructions to be used in place of the more traditional thresholding based

(2005) study dynamic coherent risk measures (for the case of random variables on finite probability space and discrete time) and introduce the notion of (strong) time consistency;

Methods: Of 124 patients with HCV-infected liver diseases treated with IFN therapy in our hospital, 14 (mean age 56.00 ± 12.94 years) who attended to receive administration of IFN

Several indicators are presented here for the net worth distributions implied by the four cross-sections of SCF data from 1989 to 1998: the percent distributions of families

Since quasigroups in general do not have algebraic properties such as associativity, commutativity, neutral elements, inverting these functions seems to require exponentially