Journal articles on the topic 'Multi-Stage Secret Sharing'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 18 journal articles for your research on the topic 'Multi-Stage Secret Sharing.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Endurthi, Anjaneyulu, Oinam B. Chanu, Appala N. Tentu, and V. Ch Venkaiah. "Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT." Journal of Communications Software and Systems 11, no. 1 (2015): 15. http://dx.doi.org/10.24138/jcomss.v11i1.113.
Full textEbrahimi, Kiasari Mohammad Ebrahim, Nasrollah Pakniat, Abdolrasoul Mirghadri, and Mojtaba Nazari. "A New Social Multi-Secret Sharing Scheme using Birkhoff Interpolation and Chinese Remainder Theorem." ISC International Journal of Information Security 15, no. 1 (2023): 125–35. https://doi.org/10.22042/isecure.2022. 293948.689.
Full textXu, Guoai, Jiangtao Yuan, Guosheng Xu, and Xingxing Jia. "A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier." Information Technology and Control 50, no. 2 (2021): 236–46. http://dx.doi.org/10.5755/j01.itc.50.2.27789.
Full textMashhadi, Samaneh. "New multi-stage secret sharing in the standard model." Information Processing Letters 127 (November 2017): 43–48. http://dx.doi.org/10.1016/j.ipl.2017.07.002.
Full textZhou Yousheng, Cheng Mingzhi, Qing Sihan, Jiang Yong, and Cui Wei. "A Novel Multi-stage (t,n) -Threshold Secret Sharing Scheme." International Journal of Advancements in Computing Technology 4, no. 5 (2012): 141–47. http://dx.doi.org/10.4156/ijact.vol4.issue5.17.
Full textZarepour-Ahmadabadi, Jamal, MohammadEbrahim Shiri-Ahmadabadi, and Alimohammad Latif. "A cellular automata-based multi-stage secret image sharing scheme." Multimedia Tools and Applications 77, no. 18 (2018): 24073–96. http://dx.doi.org/10.1007/s11042-018-5717-y.
Full textChang, Ting-Yi, Min-Shiang Hwang, and Wei-Pang Yang. "A new multi-stage secret sharing scheme using one-way function." ACM SIGOPS Operating Systems Review 39, no. 1 (2005): 48–55. http://dx.doi.org/10.1145/1044552.1044557.
Full textHadian Dehkordi, Massoud, Samaneh Mashhadi, and Hossein Oraei. "A Proactive Multi Stage Secret Sharing Scheme for Any Given Access Structure." Wireless Personal Communications 104, no. 1 (2018): 491–503. http://dx.doi.org/10.1007/s11277-018-6032-7.
Full textCHEN Yun, LI Xuanbing, and LI Shuai. "Multi-party Quantum Secret Sharing Protocol Based on Orthogonal Product States." Acta Physica Sinica 74, no. 17 (2025): 0. https://doi.org/10.7498/aps.74.20250394.
Full textMashhadi, Samaneh, Massoud Hadian Dehkordi, and Niloofar Kiamari. "Provably secure verifiable multi-stage secret sharing scheme based on monotone span program." IET Information Security 11, no. 6 (2017): 326–31. http://dx.doi.org/10.1049/iet-ifs.2017.0111.
Full textPilaram, Hossein, and Taraneh Eghlidos. "An Efficient Lattice Based Multi-stage Secret Sharing Scheme." IEEE Transactions on Dependable and Secure Computing, 2015, 1. http://dx.doi.org/10.1109/tdsc.2015.2432800.
Full textYang, Zhichao, Debiao He, Longjiang Qu, and Jianqiao Xu. "On the Security of a Lattice-Based Multi-Stage Secret Sharing Scheme." IEEE Transactions on Dependable and Secure Computing, 2022, 1–2. http://dx.doi.org/10.1109/tdsc.2022.3209011.
Full textChang, Ting-Yi, Min-Shiang Hwang, and Wei-Pang Yang. "An Improved Multi-stage Secret Sharing Scheme Based on the Factorization Problem." Information Technology And Control 40, no. 3 (2011). http://dx.doi.org/10.5755/j01.itc.40.3.633.
Full textPilaram, Hossein, Taraneh Eghlidos, and Rahim Toluee. "An efficient lattice‐based threshold signature scheme using multi‐stage secret sharing." IET Information Security, December 28, 2020. http://dx.doi.org/10.1049/ise2.12007.
Full textKuppers, Petra. "“your darkness also/rich and beyond fear”: Community Performance, Somatic Poetics and the Vessels of Self and Other." M/C Journal 12, no. 5 (2009). http://dx.doi.org/10.5204/mcj.203.
Full textCampanioni, Chris. "How Bizarre: The Glitch of the Nineties as a Fantasy of New Authorship." M/C Journal 21, no. 5 (2018). http://dx.doi.org/10.5204/mcj.1463.
Full textSarı, Simay, and Onur Mengi. "The Role of Creative Placemaking." M/C Journal 25, no. 3 (2022). http://dx.doi.org/10.5204/mcj.2899.
Full textDavis, Susan. "Wandering and Wildflowering: Walking with Women into Intimacy and Ecological Action." M/C Journal 22, no. 4 (2019). http://dx.doi.org/10.5204/mcj.1566.
Full text