Academic literature on the topic 'SECRET SHARING SYSTEM'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'SECRET SHARING SYSTEM.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "SECRET SHARING SYSTEM"
Errahmani, Hichem Bouchakour, and Hind Ikni. "A New Approach to Verifying and Sharing a Secret QR Code using Elliptic Curves." Malaysian Journal of Computing and Applied Mathematics 3, no. 1 (2020): 55–65. http://dx.doi.org/10.37231/myjcam.2020.3.1.44.
Full textChoudhary, Shipra PraveenKumar, Apeksha Katarni, Shweta Manjrekar, Mrs Vidyullata Devmane, and Mrs Vaishali Hirlekar. "Secret Sharing Approach in Multi-database System." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 6 (2016): 6819–23. http://dx.doi.org/10.24297/ijct.v15i6.1606.
Full textAlahmadi, Adel, Alaa Altassan, Ahmad AlKenani, Selda Çalkavur, Hatoon Shoaib, and Patrick Solé. "A Multisecret-Sharing Scheme Based on LCD Codes." Mathematics 8, no. 2 (2020): 272. http://dx.doi.org/10.3390/math8020272.
Full textS.Patil, Rupali, Sonali Patil, and Sudeep D. Thepade. "Secret Sharing based Secure Authentication System." International Journal of Computer Applications 118, no. 22 (2015): 8–11. http://dx.doi.org/10.5120/20875-3613.
Full textMiyamoto, Toshiyuki, Shinji Doi, Hiroki Nogawa, and Sadatoshi Kumagai. "Autonomous distributed secret sharing storage system." Systems and Computers in Japan 37, no. 6 (2006): 55–63. http://dx.doi.org/10.1002/scj.20388.
Full textErrahmani, Hichem Bouchakour, and Hind Ikni. "Verifiable Self-Selecting Secret Sharing Based on Elliptic Curves." International Journal of Software Innovation 8, no. 3 (2020): 51–68. http://dx.doi.org/10.4018/ijsi.2020070104.
Full textHashim, Ashwaq T., and Suhad A. Ali. "Reversible Multiple Image Secret Sharing Using Discrete Haar Wavelet Transform." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (2018): 5004. http://dx.doi.org/10.11591/ijece.v8i6.pp5004-5013.
Full textLi, Ying, Hong Min Jiang, and Tao Hu. "A Study on Distributed License Authorization System Based on Threshold Secret Sharing." Applied Mechanics and Materials 380-384 (August 2013): 2749–52. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2749.
Full textLai, Chun-Pong, and Cunsheng Ding. "Several Generalizations of Shamir's Secret Sharing Scheme." International Journal of Foundations of Computer Science 15, no. 02 (2004): 445–58. http://dx.doi.org/10.1142/s0129054104002510.
Full textXu, Guoai, Jiangtao Yuan, Guosheng Xu, and Xingxing Jia. "A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier." Information Technology and Control 50, no. 2 (2021): 236–46. http://dx.doi.org/10.5755/j01.itc.50.2.27789.
Full textDissertations / Theses on the topic "SECRET SHARING SYSTEM"
Olsson, Fredrik. "A Lab System for Secret Sharing." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2385.
Full textAl-Adhami, Ayad. "A secure quorum based multi-tag RFID system." Thesis, University of Plymouth, 2018. http://hdl.handle.net/10026.1/12821.
Full textReistad, Tord Ingolf. "A General Framework for Multiparty Computations." Doctoral thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-16567.
Full textGoh, Vik Tor. "Intrusion detection framework for encrypted networks." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/41733/1/Vik_Tor_Goh_Thesis.pdf.
Full textWang, Zhaohong. "Information-Theoretic Secure Outsourced Computation in Distributed Systems." UKnowledge, 2016. http://uknowledge.uky.edu/ece_etds/88.
Full textTraverso, Giulia [Verfasser], Johannes [Akademischer Betreuer] Buchmann, and Reihaneh [Akademischer Betreuer] Safavi-Naini. "Long-Term Confidential Secret Sharing-Based Distributed Storage Systems / Giulia Traverso ; Johannes Buchmann, Reihaneh Safavi-Naini." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2019. http://d-nb.info/1188410377/34.
Full textLeung, Philip, and Daniel Svensson. "SecuRES: Secure Resource Sharing System : AN INVESTIGATION INTO USE OF PUBLIC LEDGER TECHNOLOGY TO CREATE DECENTRALIZED DIGITAL RESOURCE-SHARING SYSTEMS." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-187348.
Full textSubbiah, Arun. "Efficient Proactive Security for Sensitive Data Storage." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19719.
Full textTimilsina, Santosh. "Physical Layer Security in Training-Based Single-Hop/Dual-Hop Massive MIMO Systems." OpenSIUC, 2018. https://opensiuc.lib.siu.edu/theses/2376.
Full textХіцко, Яна Володимирівна. "Математичне моделювання задач криптографії та обробки сигналів з використанням неканонічних гіперкомплексних числових систем". Thesis, НТУУ "КПІ", 2016. https://ela.kpi.ua/handle/123456789/15092.
Full textBooks on the topic "SECRET SHARING SYSTEM"
Cimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2017.
Find full textCimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2017.
Find full textCimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2017.
Find full textCimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2017.
Find full textCimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2011.
Find full textCimato, Stelvio, and Ching-Nung Yang. Visual Cryptography and Secret Image Sharing. Taylor & Francis Group, 2017.
Find full textLaderman, Charlie. Sharing the Burden. Oxford University Press, 2019. http://dx.doi.org/10.1093/oso/9780190618605.001.0001.
Full textDavis, Coralynn V. Talking Tools, Femina narrans, and the Irrepressibility of Women. University of Illinois Press, 2017. http://dx.doi.org/10.5406/illinois/9780252038426.003.0008.
Full textBook chapters on the topic "SECRET SHARING SYSTEM"
Hedabou, Mustapha. "Cloud Key Management Based on Verifiable Secret Sharing." In Network and System Security. Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-92708-0_18.
Full textLiu, Yan-Xiao, and Ching-Nung Yang. "Enhanced Secret Image Sharing Using POB Number System." In Security with Intelligent Computing and Big-data Services. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-16946-6_8.
Full textChaudhury, Shion Samadder, Sabyasachi Dutta, and Kouichi Sakurai. "$$AC^0$$ Constructions of Secret Sharing Schemes – Accommodating New Parties." In Network and System Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65745-1_17.
Full textNallabothu, Shivakrishna, N. Rukmarekha, and Y. V. Subbarao. "Generalized Secret Sharing Scheme Based on MDS Codes." In ICICCT 2019 – System Reliability, Quality Control, Safety, Maintenance and Management. Springer Singapore, 2019. http://dx.doi.org/10.1007/978-981-13-8461-5_41.
Full textWang, Ming-Ming, Lu-Ting Tian, and Zhi-Guo Qu. "Efficient Multiparty Quantum Secret Sharing Scheme in High-Dimensional System." In Cloud Computing and Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-030-00012-7_3.
Full textShi, Ronghua, Ye Kang, and Zhaoyuan Zhang. "Quantum Secret Sharing Based on Chinese Remainder Theorem in Hyperchaotic System." In Cyberspace Safety and Security. Springer International Publishing, 2013. http://dx.doi.org/10.1007/978-3-319-03584-0_31.
Full textSanyasi Naidu, P., and Reena Kharat. "Secure Authentication in Online Voting System Using Multiple Image Secret Sharing." In Communications in Computer and Information Science. Springer Singapore, 2016. http://dx.doi.org/10.1007/978-981-10-2738-3_29.
Full textPerera, Maharage Nisansala Sevwandi, Toru Nakamura, Takashi Matsunaka, Hiroyuki Yokoyama, and Kouichi Sakurai. "Group Oriented Attribute-Based Encryption Scheme from Lattices with the Employment of Shamir’s Secret Sharing Scheme." In Network and System Security. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-39828-5_9.
Full textAditya Kumar, K., and Suresh Pabboju. "Text Steganography: Design and Implementation of a Secure and Secret Message Sharing System." In Learning and Analytics in Intelligent Systems. Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-24322-7_58.
Full textCachin, Christian. "Multi-Party Threshold Cryptography." In Trends in Data Protection and Encryption Technologies. Springer Nature Switzerland, 2023. http://dx.doi.org/10.1007/978-3-031-33386-6_13.
Full textConference papers on the topic "SECRET SHARING SYSTEM"
Liu, Guangliang, Lingyun Li, Shengxian Xie, and Junqing Li. "Secret Sharing System and Secret Sharing Matrix." In 2009 International Conference on Computational Intelligence and Security. IEEE, 2009. http://dx.doi.org/10.1109/cis.2009.230.
Full textBabenko, M., A. Tchernykh, E. Golimblevskaia, H. N. Viet, and V. Chaurasiya. "Computationally secure threshold secret sharing scheme with minimal redundancy." In The International Workshop on Information, Computation, and Control Systems for Distributed Environments. Crossref, 2020. http://dx.doi.org/10.47350/iccs-de.2020.02.
Full textPatel, Kinjal. "Secure multiparty computation using secret sharing." In 2016 International conference on Signal Processing, Communication, Power and Embedded System (SCOPES). IEEE, 2016. http://dx.doi.org/10.1109/scopes.2016.7955564.
Full textWu, Wen-Chuan, Ke-Chung Cheng, and Shang-Chian Yang. "Secret digital images over cloud computing using meaningful secret sharing technique." In 2017 International Conference on Applied System Innovation (ICASI). IEEE, 2017. http://dx.doi.org/10.1109/icasi.2017.7988579.
Full textBraun, Johannes, Alexander Wiesmaier, and Johannes Buchmann. "On the Security of Encrypted Secret Sharing." In 2013 46th Hawaii International Conference on System Sciences (HICSS). IEEE, 2013. http://dx.doi.org/10.1109/hicss.2013.426.
Full textArora, Shakti, Dinesh Chander Verma, and Vijay Anant Athavale. "A secured automated Attendance Management System implemented with Secret Sharing Algorithm." In 2020 Sixth International Conference on Parallel, Distributed and Grid Computing (PDGC). IEEE, 2020. http://dx.doi.org/10.1109/pdgc50313.2020.9315854.
Full textJames, Ann Jisna, and Reena Kharat. "POB Number System Based Multi-Image Secret Sharing." In 2018 Fourth International Conference on Computing Communication Control and Automation (ICCUBEA). IEEE, 2018. http://dx.doi.org/10.1109/iccubea.2018.8697546.
Full textTeramura, Keisuke, and Hiroyuki Inaba. "Secret sharing database system for preventing frequency analysis." In 2017 IEEE 6th Global Conference on Consumer Electronics (GCCE). IEEE, 2017. http://dx.doi.org/10.1109/gcce.2017.8229228.
Full textJiang, Hongmin, and Ying Li. "Improved Threshold Secret Sharing Distributed License Authorization System." In 2nd International Conference on Computer Science and Electronics Engineering (ICCSEE 2013). Atlantis Press, 2013. http://dx.doi.org/10.2991/iccsee.2013.166.
Full textHazu, Ryohei, Yusuke Kozawa, and Hiromasa Habuchi. "Visual Secret Sharing Based RGB Parallel Transmission System." In 2021 24th International Symposium on Wireless Personal Multimedia Communications (WPMC). IEEE, 2021. http://dx.doi.org/10.1109/wpmc52694.2021.9700429.
Full textReports on the topic "SECRET SHARING SYSTEM"
Raja, Rameez Ali, Vidushi Toshniwal, and Rodrigo Salgado. GIS-Based Geotechnical Database for Collaborative GIS. Purdue University, 2023. http://dx.doi.org/10.5703/1288284317637.
Full textAfrican Open Science Platform Part 1: Landscape Study. Academy of Science of South Africa (ASSAf), 2019. http://dx.doi.org/10.17159/assaf.2019/0047.
Full text