Academic literature on the topic 'Multi-Stage Secret Sharing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Multi-Stage Secret Sharing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Multi-Stage Secret Sharing"
Endurthi, Anjaneyulu, Oinam B. Chanu, Appala N. Tentu, and V. Ch Venkaiah. "Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT." Journal of Communications Software and Systems 11, no. 1 (2015): 15. http://dx.doi.org/10.24138/jcomss.v11i1.113.
Full textEbrahimi, Kiasari Mohammad Ebrahim, Nasrollah Pakniat, Abdolrasoul Mirghadri, and Mojtaba Nazari. "A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem." ISC International Journal of Information Security 15, no. 1 (2023): 125–35. https://doi.org/10.22042/isecure.2022. 293948.689.
Full textXu, Guoai, Jiangtao Yuan, Guosheng Xu, and Xingxing Jia. "A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier." Information Technology and Control 50, no. 2 (2021): 236–46. http://dx.doi.org/10.5755/j01.itc.50.2.27789.
Full textMashhadi, Samaneh. "New multi-stage secret sharing in the standard model." Information Processing Letters 127 (November 2017): 43–48. http://dx.doi.org/10.1016/j.ipl.2017.07.002.
Full textZhou Yousheng, Cheng Mingzhi, Qing Sihan, Jiang Yong, and Cui Wei. "A Novel Multi-stage (t,n) -Threshold Secret Sharing Scheme." International Journal of Advancements in Computing Technology 4, no. 5 (2012): 141–47. http://dx.doi.org/10.4156/ijact.vol4.issue5.17.
Full textZarepour-Ahmadabadi, Jamal, MohammadEbrahim Shiri-Ahmadabadi, and Alimohammad Latif. "A cellular automata-based multi-stage secret image sharing scheme." Multimedia Tools and Applications 77, no. 18 (2018): 24073–96. http://dx.doi.org/10.1007/s11042-018-5717-y.
Full textChang, Ting-Yi, Min-Shiang Hwang, and Wei-Pang Yang. "A new multi-stage secret sharing scheme using one-way function." ACM SIGOPS Operating Systems Review 39, no. 1 (2005): 48–55. http://dx.doi.org/10.1145/1044552.1044557.
Full textHadian Dehkordi, Massoud, Samaneh Mashhadi, and Hossein Oraei. "A Proactive Multi Stage Secret Sharing Scheme for Any Given Access Structure." Wireless Personal Communications 104, no. 1 (2018): 491–503. http://dx.doi.org/10.1007/s11277-018-6032-7.
Full textCHEN Yun, LI Xuanbing, and LI Shuai. "Multi-party Quantum Secret Sharing Protocol Based on Orthogonal Product States." Acta Physica Sinica 74, no. 17 (2025): 0. https://doi.org/10.7498/aps.74.20250394.
Full textMashhadi, Samaneh, Massoud Hadian Dehkordi, and Niloofar Kiamari. "Provably secure verifiable multi-stage secret sharing scheme based on monotone span program." IET Information Security 11, no. 6 (2017): 326–31. http://dx.doi.org/10.1049/iet-ifs.2017.0111.
Full textBook chapters on the topic "Multi-Stage Secret Sharing"
Li, Hui-Xian, Chun-Tian Cheng, and Liao-Jun Pang. "An Improved Multi-stage (t, n)-Threshold Secret Sharing Scheme." In Advances in Web-Age Information Management. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11563952_24.
Full textFatemi, Mitra, Taraneh Eghlidos, and Mohammadreza Aref. "A Multi-stage Secret Sharing Scheme Using All-or-Nothing Transform Approach." In Information and Communications Security. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-11145-7_35.
Full textOgiela, Marek R., and Urszula Ogiela. "Information Security Management Based on Linguistic Sharing Techniques." In Threats, Countermeasures, and Advances in Applied Information Security. IGI Global, 2012. http://dx.doi.org/10.4018/978-1-4666-0978-5.ch009.
Full textConference papers on the topic "Multi-Stage Secret Sharing"
Li, Xu, Yinghao Wu, Yang Liu, Baosheng Wang, Bei Wang, and Yijun Cui. "Lattice-based Multi-Stage Secret Sharing 3D Secure Encryption Scheme." In 2024 IEEE 23rd International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2024. https://doi.org/10.1109/trustcom63139.2024.00061.
Full textBasit, Abdul, N. Chaitanya Kumar, V. Ch Venkaiah, Salman Abdul Moiz, Appala Naidu Tentu, and Wilson Naik. "Multi-stage multi-secret sharing scheme for hierarchical access structure." In 2017 International Conference on Computing, Communication and Automation (ICCCA). IEEE, 2017. http://dx.doi.org/10.1109/ccaa.2017.8229863.
Full textChanu, Oinam Bidyapati, Appala Naidu Tentu, and V. Ch Venkaiah. "Multi-Stage Multi-Secret Sharing Schemes Based on Chinese Remainder Theorem." In the 2015 International Conference. ACM Press, 2015. http://dx.doi.org/10.1145/2743065.2743082.
Full textWei, Yun, Pucha Zhong, and Guohua Xiong. "A Multi-Stage Secret Sharing Scheme with General Access Structures." In 2008 4th International Conference on Wireless Communications, Networking and Mobile Computing (WiCOM). IEEE, 2008. http://dx.doi.org/10.1109/wicom.2008.2939.
Full text