منابع مشابه
Exclusion-Intersection Encryption and Its Application to Searchable Encryption⋆
Identity (or identifier) based encryption has shown to be a useful cryptographic schema enabling secure yet flexible role-based access control. In this paper, we propose a new notion named as exclusionintersection encryption: the sender can specify the targeted groups that are legitimated and interested in reading the documents in the encryption algorithm; there exists a trusted key generation ...
متن کاملDistributed Localization Algorithm based on Intersection and Exclusion
In this study, we present a novel mobile anchor-assisted node Localization algorithm using Intersection and Exclusion (LIE) for wireless sensor networks. It sets up a discrete network model and then solves a system of geographic constraints based on connectivity information from the underlying communication network. Moreover, after the nearby nodes have completed localization, they become beaco...
متن کاملMaternal deaths in Pakistan: intersection of gender, caste, and social exclusion
BACKGROUND A key aim of countries with high maternal mortality rates is to increase availability of competent maternal health care during pregnancy and childbirth. Yet, despite significant investment, countries with the highest burdens have not reduced their rates to the expected levels. We argue, taking Pakistan as a case study, that improving physical availability of services is necessary but...
متن کاملModules with copure intersection property
In this paper, we investigate the modules with the copure intersection property and obtained obtain some related results.
متن کاملInclusion-exclusion meets exclusion
When evaluating the inclusion-exclusion expansion N0 −N(1) −N(2) − · · ·+N(1, 2) +N(1, 3) + · · · many of the terms N(· · ·) may turn out to be zero, and hence should be discarded beforehand. Often this can be done.
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Security and Networks
سال: 2011
ISSN: 1747-8405,1747-8413
DOI: 10.1504/ijsn.2011.043672