{"id":40399,"date":"1999-01-01T00:00:00","date_gmt":"1999-01-01T00:00:00","guid":{"rendered":"https:\/\/www.deberes.net\/tesis\/sin-categoria\/compartir-secretos-mediante-esquemas-basados-en-codigos-correctores\/"},"modified":"1999-01-01T00:00:00","modified_gmt":"1999-01-01T00:00:00","slug":"compartir-secretos-mediante-esquemas-basados-en-codigos-correctores","status":"publish","type":"post","link":"https:\/\/www.deberes.net\/tesis\/matematicas\/compartir-secretos-mediante-esquemas-basados-en-codigos-correctores\/","title":{"rendered":"Compartir secretos mediante esquemas basados en codigos correctores."},"content":{"rendered":"<h2>Tesis doctoral de <strong> Policarpo Abascal Fuentes <\/strong><\/h2>\n<p>En esta memoria se estudia el problema del reparto de secretos mediante la utilizaci\u00f3n de c\u00f3digos correctores de errores, comprob\u00e1ndose que son un marco de trabajo id\u00f3neo para la resoluci\u00f3n del problema, puesto que hemos visto que generalizan y engloban las soluciones cl\u00e1sicas.  hemos construido dos algoritmos que construyen c\u00f3digos a trav\u00e9s de sus matrices, generatriz y de chequeo, que resuelven el problema de realizar una estructura de acceso dada con una tasa de informaci\u00f3n prefijada en el caso de que \u00e9ste exista; lo que nos permite asegurar una soluci\u00f3n \u00f3ptima en el caso en que se conozca la tasa de informaci\u00f3n \u00f3ptima que puede alcanzar la estructura de acceso.  paralelamente, se han estudiado las estructuras de acceso, en cuanto a su tasa de informaci\u00f3n y a su construcci\u00f3n lo que nos ha permitido clasificarlas en distintos grupos para un posterior estudio del esquema que las pueda realizar de manera \u00f3ptima.<\/p>\n<p>&nbsp;<\/p>\n<h3>Datos acad\u00e9micos de la tesis doctoral \u00ab<strong>Compartir secretos mediante esquemas basados en codigos correctores.<\/strong>\u00ab<\/h3>\n<ul>\n<li><strong>T\u00edtulo de la tesis:<\/strong>\u00a0 Compartir secretos mediante esquemas basados en codigos correctores. <\/li>\n<li><strong>Autor:<\/strong>\u00a0 Policarpo Abascal Fuentes <\/li>\n<li><strong>Universidad:<\/strong>\u00a0 Oviedo<\/li>\n<li><strong>Fecha de lectura de la tesis:<\/strong>\u00a0 01\/01\/1999<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h3>Direcci\u00f3n y tribunal<\/h3>\n<ul>\n<li><strong>Director de la tesis<\/strong>\n<ul>\n<li>Juan  Gabriel Tena Ayuso<\/li>\n<\/ul>\n<\/li>\n<li><strong>Tribunal<\/strong>\n<ul>\n<li>Presidente del tribunal: santos Gonzalez jimenez <\/li>\n<li>josep Rifa coma (vocal)<\/li>\n<li>Mar\u00eda  paz Morillo bosch (vocal)<\/li>\n<li>Antonio Campillo l\u00f3pez (vocal)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tesis doctoral de Policarpo Abascal Fuentes En esta memoria se estudia el problema del reparto de secretos mediante la utilizaci\u00f3n [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"site-sidebar-layout":"default","site-content-layout":"","ast-site-content-layout":"","site-content-style":"default","site-sidebar-style":"default","ast-global-header-display":"","ast-banner-title-visibility":"","ast-main-header-display":"","ast-hfb-above-header-display":"","ast-hfb-below-header-display":"","ast-hfb-mobile-header-display":"","site-post-title":"","ast-breadcrumbs-content":"","ast-featured-img":"","footer-sml-layout":"","theme-transparent-header-meta":"","adv-header-id-meta":"","stick-header-meta":"","header-above-stick-meta":"","header-main-stick-meta":"","header-below-stick-meta":"","astra-migrate-meta-layouts":"default","ast-page-background-enabled":"default","ast-page-background-meta":{"desktop":{"background-color":"var(--ast-global-color-4)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"ast-content-background-meta":{"desktop":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"tablet":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""},"mobile":{"background-color":"var(--ast-global-color-5)","background-image":"","background-repeat":"repeat","background-position":"center center","background-size":"auto","background-attachment":"scroll","background-type":"","background-media":"","overlay-type":"","overlay-color":"","overlay-gradient":""}},"footnotes":""},"categories":[2809,1890,12500,126,8846],"tags":[9617,12503,12502,47498,40721,25403],"class_list":["post-40399","post","type-post","status-publish","format-standard","hentry","category-algebra","category-ciencia-de-los-ordenadores","category-codigo-y-sistemas-de-codificacion","category-matematicas","category-oviedo","tag-antonio-campillo-lopez","tag-josep-rifa-coma","tag-juan-gabriel-tena-ayuso","tag-maria-paz-morillo-bosch","tag-policarpo-abascal-fuentes","tag-santos-gonzalez-jimenez"],"_links":{"self":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/40399","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/comments?post=40399"}],"version-history":[{"count":0,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/posts\/40399\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/media?parent=40399"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/categories?post=40399"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.deberes.net\/tesis\/wp-json\/wp\/v2\/tags?post=40399"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}