Journal articles on the topic 'Authentication and secret sharing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Authentication and secret sharing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Choudhary, Shipra PraveenKumar, Apeksha Katarni, Shweta Manjrekar, Mrs Vidyullata Devmane, and Mrs Vaishali Hirlekar. "Secret Sharing Approach in Multi-database System." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 6 (April 20, 2016): 6819–23. http://dx.doi.org/10.24297/ijct.v15i6.1606.
Full textS.Patil, Rupali, Sonali Patil, and Sudeep D. Thepade. "Secret Sharing based Secure Authentication System." International Journal of Computer Applications 118, no. 22 (May 20, 2015): 8–11. http://dx.doi.org/10.5120/20875-3613.
Full textSirdeshpande, Janhavi, and Sonali Patil. "Amended Biometric Authentication using Secret Sharing." International Journal of Computer Applications 98, no. 21 (July 18, 2014): 28–32. http://dx.doi.org/10.5120/17308-7770.
Full textSun Ying, Du Jian-Zhong, Qin Su-Juan, Wen Qiao-Yan, and Zhu Fu-Chen. "Quantum secret sharing with bidirectional authentication." Acta Physica Sinica 57, no. 8 (2008): 4689. http://dx.doi.org/10.7498/aps.57.4689.
Full textTu, Shu-Fen, Ching-Sheng Hsu, and Fu-Hsing Wang. "Application of Threshold Secret Sharing to Image Authentication and Recovery." SIJ Transactions on Computer Science Engineering & its Applications (CSEA) 01, no. 05 (December 2, 2013): 32–38. http://dx.doi.org/10.9756/sijcsea/v1i5/0104640402.
Full textBezzateev, Sergey, Vadim Davydov, and Aleksandr Ometov. "On Secret Sharing with Newton’s Polynomial for Multi-Factor Authentication." Cryptography 4, no. 4 (December 1, 2020): 34. http://dx.doi.org/10.3390/cryptography4040034.
Full textLin, Chang-Chou, and Wen-Hsiang Tsai. "Secret image sharing with steganography and authentication." Journal of Systems and Software 73, no. 3 (November 2004): 405–14. http://dx.doi.org/10.1016/s0164-1212(03)00239-5.
Full textArafin, Md Tanvir, and Gang Qu. "Memristors for Secret Sharing-Based Lightweight Authentication." IEEE Transactions on Very Large Scale Integration (VLSI) Systems 26, no. 12 (December 2018): 2671–83. http://dx.doi.org/10.1109/tvlsi.2018.2823714.
Full textJiang, Yue, Xuehu Yan, Jianqing Qi, Yuliang Lu, and Xuan Zhou. "Secret Image Sharing with Dealer-Participatory and Non-Dealer-Participatory Mutual Shadow Authentication Capabilities." Mathematics 8, no. 2 (February 12, 2020): 234. http://dx.doi.org/10.3390/math8020234.
Full textZhu, Yuesheng, Bojun Wang, and Cheng Cai. "A Novel Smart-Card Based Authentication Scheme Using Proactive Secret Sharing." International Journal of Computer and Communication Engineering 5, no. 3 (2016): 196–205. http://dx.doi.org/10.17706/ijcce.2016.5.3.196-205.
Full textAbulkasim, Hussein, Safwat Hamad, Amal Khalifa, and Khalid El Bahnasy. "Quantum secret sharing with identity authentication based on Bell states." International Journal of Quantum Information 15, no. 04 (May 3, 2017): 1750023. http://dx.doi.org/10.1142/s021974991750023x.
Full textYang, Yu Guang, and Hai Ping Chai. "A Trusted Multi-Party Authentication Scheme Based on Proactive-ElGamal Threshold Secret Sharing System." Applied Mechanics and Materials 235 (November 2012): 20–24. http://dx.doi.org/10.4028/www.scientific.net/amm.235.20.
Full textYANG, Chao, and Hong-qi ZHANG. "RFID authentication protocol based on secret-sharing scheme." Journal of Computer Applications 32, no. 12 (May 30, 2013): 3458–61. http://dx.doi.org/10.3724/sp.j.1087.2012.03458.
Full textXU, Rui, Kirill MOROZOV, and Tsuyoshi TAKAGI. "Secret Sharing with Cheaters Using Multi-Receiver Authentication." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E100.A, no. 1 (2017): 115–25. http://dx.doi.org/10.1587/transfun.e100.a.115.
Full textUlutas, Guzin, Mustafa Ulutas, and Vasif V. Nabiyev. "Secret image sharing scheme with adaptive authentication strength." Pattern Recognition Letters 34, no. 3 (February 2013): 283–91. http://dx.doi.org/10.1016/j.patrec.2012.10.017.
Full textYang, YuGuang, Qiaoyan Wen, and Xing Zhang. "Multiparty simultaneous quantum identity authentication with secret sharing." Science in China Series G: Physics, Mechanics and Astronomy 51, no. 3 (March 2008): 321–27. http://dx.doi.org/10.1007/s11433-008-0034-5.
Full textYan, Xuehu, Qinghong Gong, Longlong Li, Guozheng Yang, Yuliang Lu, and Jingju Liu. "Secret image sharing with separate shadow authentication ability." Signal Processing: Image Communication 82 (March 2020): 115721. http://dx.doi.org/10.1016/j.image.2019.115721.
Full textKang, Ye, Ying Guo, Hai Zhong, Guojun Chen, and Xiaojun Jing. "Continuous Variable Quantum Secret Sharing with Fairness." Applied Sciences 10, no. 1 (December 25, 2019): 189. http://dx.doi.org/10.3390/app10010189.
Full textShenets, N. "Multi-Factor One-Way Authentication and Key Retrieval Based on Ideal Threshold Secret Sharing." Nonlinear Phenomena in Complex Systems 23, no. 1 (April 14, 2020): 54–65. http://dx.doi.org/10.33581/1561-4085-2020-23-1-54-65.
Full textZhang, Lina, Xuan Dang, Li Feng, and Junhan Yang. "Efficient Secret Image Sharing Scheme with Authentication and Cheating Prevention." Mathematical Problems in Engineering 2021 (August 21, 2021): 1–11. http://dx.doi.org/10.1155/2021/9274415.
Full textEslami, Z., and J. Zarepour Ahmadabadi. "Secret image sharing with authentication-chaining and dynamic embedding." Journal of Systems and Software 84, no. 5 (May 2011): 803–9. http://dx.doi.org/10.1016/j.jss.2011.01.002.
Full textA B, Rajendra, and Sheshadri H S. "Visual Secret Sharing for Secure Biometric Authentication using Steganography." INTERNATIONAL JOURNAL OF COMPUTING ALGORITHM 3, no. 1 (June 13, 2014): 97–100. http://dx.doi.org/10.20894/ijcoa.101.003.001.026.
Full textLiu, Yanxiao, Qindong Sun, Yichuan Wang, Lei Zhu, and Wenjiang Ji. "Efficient group authentication in RFID using secret sharing scheme." Cluster Computing 22, S4 (February 10, 2018): 8605–11. http://dx.doi.org/10.1007/s10586-018-1929-1.
Full textChang, Chin-Chen, Yi-Hui Chen, and Hsin-Chi Wang. "Meaningful secret sharing technique with authentication and remedy abilities." Information Sciences 181, no. 14 (July 2011): 3073–84. http://dx.doi.org/10.1016/j.ins.2011.03.002.
Full textSingh, Sachin Kumar, and Mainejar Yadav. "A (k, n) Audio Secret Sharing with Share Authentication." International Journal of Computing and Digital Systems 10, no. 1 (January 1, 2021): 167–80. http://dx.doi.org/10.12785/ijcds/100117.
Full textYadav, Mainejar, and Ranvijay . "Emerging Trends in Visual Secret Sharing." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 374. http://dx.doi.org/10.14419/ijet.v7i3.12.16110.
Full textLavanya, D. L., R. Ramaprabha, and K. Gunaseelan. "Privacy Preserving Physical Layer Authentication Scheme for LBS based Wireless Networks." Defence Science Journal 71, no. 2 (March 10, 2021): 241–47. http://dx.doi.org/10.14429/dsj.71.15355.
Full textFălămaş, Diana-Elena, Kinga Marton, and Alin Suciu. "Assessment of Two Privacy Preserving Authentication Methods Using Secure Multiparty Computation Based on Secret Sharing." Symmetry 13, no. 5 (May 18, 2021): 894. http://dx.doi.org/10.3390/sym13050894.
Full textHamid Lone, Auqib, Ab Waheed Lone, and Moin Uddin. "A Novel Scheme for Image Authentication and Secret Data Sharing." International Journal of Computer Network and Information Security 8, no. 9 (September 8, 2016): 10–18. http://dx.doi.org/10.5815/ijcnis.2016.09.02.
Full textKIKUCHI, Ryo, Koji CHIDA, Dai IKARASHI, and Koki HAMADA. "Password-Based Authentication Protocol for Secret-Sharing-Based Multiparty Computation." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E101.A, no. 1 (2018): 51–63. http://dx.doi.org/10.1587/transfun.e101.a.51.
Full textUlutas, M., G. Ulutas, and V. V. Nabiyev. "Secret image sharing with enhanced visual quality and authentication mechanism." Imaging Science Journal 59, no. 3 (June 2011): 154–65. http://dx.doi.org/10.1179/136821910x12863757400240.
Full textNiranjana, Mrs G., and Ms K. Siva Shalini. "Authentication of grayscale document images using shamir secret sharing scheme." IOSR Journal of Computer Engineering 16, no. 2 (2014): 75–79. http://dx.doi.org/10.9790/0661-16277579.
Full textQin, Hua Wang, Xiao Hua Zhu, and Yue Wei Dai. "A Leakproof Secret Sharing Scheme Based on Environment Sensing." Applied Mechanics and Materials 665 (October 2014): 647–53. http://dx.doi.org/10.4028/www.scientific.net/amm.665.647.
Full textAhmadian, Zahra, and Sadegh Jamshidpour. "Linear Subspace Cryptanalysis of Harn’s Secret Sharing-Based Group Authentication Scheme." IEEE Transactions on Information Forensics and Security 13, no. 2 (February 2018): 502–10. http://dx.doi.org/10.1109/tifs.2017.2757454.
Full textMitchell, C. J., F. C. Piper, M. Walker, and P. Wild. "Authentication schemes, perfect local randomizers, perfect secrecy and secret sharing schemes." Designs, Codes and Cryptography 7, no. 1-2 (January 1996): 101–10. http://dx.doi.org/10.1007/bf00125078.
Full textVergados, Dimitrios D., and Giannis Stergiou. "An Authentication Scheme for Ad-hoc Networks using Threshold Secret Sharing." Wireless Personal Communications 43, no. 4 (August 17, 2007): 1767–80. http://dx.doi.org/10.1007/s11277-007-9345-5.
Full textXiong, Lizhi, Xinwei Zhong, Ching-Nung Yang, and Xiao Han. "Transform Domain-Based Invertible and Lossless Secret Image Sharing With Authentication." IEEE Transactions on Information Forensics and Security 16 (2021): 2912–25. http://dx.doi.org/10.1109/tifs.2021.3065794.
Full textDeng, Tianpeng, Xuan Li, Biao Jin, Lei Chen, and Jie Lin. "Achieving Lightweight Privacy-Preserving Image Sharing and Illegal Distributor Detection in Social IoT." Security and Communication Networks 2021 (June 5, 2021): 1–13. http://dx.doi.org/10.1155/2021/5519558.
Full textKumari, Rani, Parma Nand, and Suneet Chaudhary. "SECURE COMMUNICATION USING PFS IN A DISTRIBUTED ENVIRONMENT." International Journal of Students' Research in Technology & Management 6, no. 2 (March 2, 2018): 20–24. http://dx.doi.org/10.18510/ijsrtm.2018.624.
Full textFathimal, P. Mohamed, and P. Arockia Jansi Rani. "K out of N Secret Sharing Scheme for Multiple Color Images with Steganography and Authentication." International Journal of Image and Graphics 16, no. 02 (April 2016): 1650010. http://dx.doi.org/10.1142/s0219467816500108.
Full textLeung, D. W. "Quantum vernam cipher." Quantum Information and Computation 2, no. 1 (January 2002): 14–34. http://dx.doi.org/10.26421/qic2.1-2.
Full textShenets, N. N. "Authentication in dynamic peer-to-peer networks based on homomorphic secret sharing." Automatic Control and Computer Sciences 51, no. 8 (December 2017): 936–46. http://dx.doi.org/10.3103/s0146411617080193.
Full textLiu, Yanjun, and Chin-Chen Chang. "A turtle shell-based visual secret sharing scheme with reversibility and authentication." Multimedia Tools and Applications 77, no. 19 (February 20, 2018): 25295–310. http://dx.doi.org/10.1007/s11042-018-5785-z.
Full textLim, Dong-Hyun, and Soo-Jin Lee. "Public Key Authentication using Secret Sharing and ECC for Tactical Communication Networks." Journal of Security Engineering 13, no. 6 (December 31, 2016): 421–38. http://dx.doi.org/10.14257/jse.2016.12.04.
Full textLopes, Ana Paula G., Lucas O. Hilgert, Paulo RL Gondim, and Jaime Lloret. "Secret sharing-based authentication and key agreement protocol for machine-type communications." International Journal of Distributed Sensor Networks 15, no. 4 (April 2019): 155014771984100. http://dx.doi.org/10.1177/1550147719841003.
Full textJi, Wenjiang, Lei Zhu, Yichuan Wang, Zheng Liu, and Xinhong Hei. "RSU authentication in vehicular ad hoc networks base on verifiable secret sharing." Journal of Intelligent & Fuzzy Systems 37, no. 4 (October 25, 2019): 4531–36. http://dx.doi.org/10.3233/jifs-179286.
Full textWu, C.-C., M.-S. Hwang, and S.-J. Kao. "A new approach to the secret image sharing with steganography and authentication." Imaging Science Journal 57, no. 3 (June 2009): 140–51. http://dx.doi.org/10.1179/174313109x459887.
Full textWu, Xiaotian, Ching-Nung Yang, and Yi-Yun Yang. "Sharing and hiding a secret image in color palette images with authentication." Multimedia Tools and Applications 79, no. 35-36 (July 5, 2020): 25657–77. http://dx.doi.org/10.1007/s11042-020-09253-2.
Full textHsieh, Shang-Lin, I.-Ju Tsai, Chung-Ping Yeh, and Chia-Ming Chang. "An image authentication scheme based on digital watermarking and image secret sharing." Multimedia Tools and Applications 52, no. 2-3 (May 2, 2010): 597–619. http://dx.doi.org/10.1007/s11042-010-0520-4.
Full textWu, Xiaotian, and Ching-Nung Yang. "Invertible secret image sharing with steganography and authentication for AMBTC compressed images." Signal Processing: Image Communication 78 (October 2019): 437–47. http://dx.doi.org/10.1016/j.image.2019.08.007.
Full text