Yet Another Attack On the Chinese Remainder Theorem Based Hierarchical Access Control Scheme.
Niu LiuShaohua TangLingling XuPublished in: IACR Cryptol. ePrint Arch. (2013)
Keyphrases
- control scheme
- chinese remainder theorem
- closed loop
- control system
- control strategy
- dynamic model
- control loop
- controller design
- robot manipulators
- secret image sharing
- fuzzy controller
- control law
- predictive control
- robotic manipulator
- neural network controller
- fault tolerant control
- pid controller
- induction motor
- pi control
- control algorithm
- adaptive neural control
- position control
- tracking error
- feedback control
- control method
- mathematical model
- image quality