Yet another attack on the chinese remainder theorem-based hierarchical access control scheme.
Niu LiuShaohua TangLingling XuPublished in: Secur. Commun. Networks (2014)
Keyphrases
- control scheme
- chinese remainder theorem
- closed loop
- control strategy
- control system
- dynamic model
- control law
- predictive control
- controller design
- secret image sharing
- control loop
- robot manipulators
- pid controller
- fuzzy controller
- neural network controller
- induction motor
- operating conditions
- robotic manipulator
- tracking error
- real time
- image sequences