Articoli di riviste sul tema "MULTI SECRET SHARING SCHEME"
Cita una fonte nei formati APA, MLA, Chicago, Harvard e in molti altri stili
Vedi i top-50 articoli di riviste per l'attività di ricerca sul tema "MULTI SECRET SHARING SCHEME".
Accanto a ogni fonte nell'elenco di riferimenti c'è un pulsante "Aggiungi alla bibliografia". Premilo e genereremo automaticamente la citazione bibliografica dell'opera scelta nello stile citazionale di cui hai bisogno: APA, MLA, Harvard, Chicago, Vancouver ecc.
Puoi anche scaricare il testo completo della pubblicazione scientifica nel formato .pdf e leggere online l'abstract (il sommario) dell'opera se è presente nei metadati.
Vedi gli articoli di riviste di molte aree scientifiche e compila una bibliografia corretta.
Endurthi, Anjaneyulu, Oinam B. Chanu, Appala N. Tentu e V. Ch Venkaiah. "Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT". Journal of Communications Software and Systems 11, n. 1 (23 marzo 2015): 15. http://dx.doi.org/10.24138/jcomss.v11i1.113.
Testo completoZHANG, EN, e YONGQUAN CAI. "RATIONAL MULTI-SECRET SHARING SCHEME IN STANDARD POINT-TO-POINT COMMUNICATION NETWORKS". International Journal of Foundations of Computer Science 24, n. 06 (settembre 2013): 879–97. http://dx.doi.org/10.1142/s012905411350024x.
Testo completoCai, Hongliang, e Dan Tang. "Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares". Mathematics 8, n. 9 (14 settembre 2020): 1582. http://dx.doi.org/10.3390/math8091582.
Testo completoJuan, Justie Su-Tzu, Jen-Yu Lin, Bo-Yuan Huang e Yu-Chun Chung. "Advanced fault-tolerant visual multi-secret sharing scheme". Journal of Surveillance, Security and Safety 3 (2022): 41–54. http://dx.doi.org/10.20517/jsss.2021.29.
Testo completoLuo, Shuangshuang, Zhihui Li, Depeng Meng e Jiansheng Guo. "Efficient quantum secret sharing scheme based on monotone span program". Laser Physics 33, n. 8 (22 giugno 2023): 085201. http://dx.doi.org/10.1088/1555-6611/acd630.
Testo completoXu, Guoai, Jiangtao Yuan, Guosheng Xu e Xingxing Jia. "A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier". Information Technology and Control 50, n. 2 (17 giugno 2021): 236–46. http://dx.doi.org/10.5755/j01.itc.50.2.27789.
Testo completoChen, Chien-Chang, Cheng-Shian Lin e Jia-Zhan Chen. "Boolean-Based (k, n, m) Multi-Secret Image Sharing". Axioms 11, n. 5 (23 aprile 2022): 197. http://dx.doi.org/10.3390/axioms11050197.
Testo completoCsirmaz, Laszlo. "Secret sharing and duality". Journal of Mathematical Cryptology 15, n. 1 (25 novembre 2020): 157–73. http://dx.doi.org/10.1515/jmc-2019-0045.
Testo completoChang, Joy, Bo-Yuan Huang e Justie Juan. "A New Visual Multi-Secrets Sharing Scheme by Random Grids". Cryptography 2, n. 3 (17 settembre 2018): 24. http://dx.doi.org/10.3390/cryptography2030024.
Testo completoHwang, Ren-Junn, e Chin-Chen Chang. "An on-line secret sharing scheme for multi-secrets". Computer Communications 21, n. 13 (settembre 1998): 1170–76. http://dx.doi.org/10.1016/s0140-3664(98)00191-1.
Testo completoChoudhary, Shipra PraveenKumar, Apeksha Katarni, Shweta Manjrekar, Mrs Vidyullata Devmane e Mrs Vaishali Hirlekar. "Secret Sharing Approach in Multi-database System". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, n. 6 (20 aprile 2016): 6819–23. http://dx.doi.org/10.24297/ijct.v15i6.1606.
Testo completoQin, Hua Wang, Xiao Hua Zhu e Yue Wei Dai. "A Secret Sharing Scheme on Access Structure". Applied Mechanics and Materials 571-572 (giugno 2014): 63–68. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.63.
Testo completoLin, Yan, Hongliang Zhu, Guoai Xu e Guosheng Xu. "Hierarchical secret sharing scheme for WSN based on linear homogeneous recurrence relations". International Journal of Distributed Sensor Networks 18, n. 3 (marzo 2022): 155013292210887. http://dx.doi.org/10.1177/15501329221088740.
Testo completoEslamia, Khadijeh, e Mojtaba Bahramiana. "An isogeny-based quantum-resistant secret sharing scheme". Filomat 36, n. 10 (2022): 3249–58. http://dx.doi.org/10.2298/fil2210249e.
Testo completoMAO, Ying-ying, Ming MAO e Yan-shuo ZHANG. "Verifiable hierarchical threshold multi-secret sharing scheme". Journal of Computer Applications 29, n. 1 (25 giugno 2009): 172–74. http://dx.doi.org/10.3724/sp.j.1087.2009.00172.
Testo completoWANG, Wei, e Shun-xian ZHOU. "Multi-secret sharing scheme among weighted participants". Journal of Computer Applications 30, n. 12 (6 gennaio 2011): 3334–36. http://dx.doi.org/10.3724/sp.j.1087.2010.03334.
Testo completoWang, Jian, Yanheng Liu e Yanxi Wang. "On Novel Verifiable Multi-Secret Sharing Scheme". Advanced Science Letters 4, n. 11 (1 novembre 2011): 3709–15. http://dx.doi.org/10.1166/asl.2011.1259.
Testo completoYang, Chou-Chen, Ting-Yi Chang e Min-Shiang Hwang. "A (t,n) multi-secret sharing scheme". Applied Mathematics and Computation 151, n. 2 (aprile 2004): 483–90. http://dx.doi.org/10.1016/s0096-3003(03)00355-2.
Testo completoMishra, Abhishek, e Ashutosh Gupta. "Multi secret sharing scheme using iterative method". Journal of Information and Optimization Sciences 39, n. 3 (3 aprile 2018): 631–41. http://dx.doi.org/10.1080/02522667.2017.1385161.
Testo completoZhao, Jianjie, Jianzhong Zhang e Rong Zhao. "A practical verifiable multi-secret sharing scheme". Computer Standards & Interfaces 29, n. 1 (gennaio 2007): 138–41. http://dx.doi.org/10.1016/j.csi.2006.02.004.
Testo completoChan, Chao-Wen, e Chin-Chen Chang. "A scheme for threshold multi-secret sharing". Applied Mathematics and Computation 166, n. 1 (luglio 2005): 1–14. http://dx.doi.org/10.1016/j.amc.2004.04.081.
Testo completoPang, Liao-Jun, e Yu-Min Wang. "A new (t,n) multi-secret sharing scheme based on Shamir’s secret sharing". Applied Mathematics and Computation 167, n. 2 (agosto 2005): 840–48. http://dx.doi.org/10.1016/j.amc.2004.06.120.
Testo completoZhou, Jun, e Zhen Yu Yang. "Data Privacy Preservation in Wireless Sensor Networks Based on Multi-Secret Sharing Scheme". Applied Mechanics and Materials 411-414 (settembre 2013): 141–44. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.141.
Testo completoMesnager, Sihem, Ahmet Sınak e Oğuz Yayla. "Threshold-Based Post-Quantum Secure Verifiable Multi-Secret Sharing for Distributed Storage Blockchain". Mathematics 8, n. 12 (14 dicembre 2020): 2218. http://dx.doi.org/10.3390/math8122218.
Testo completoQin, Hua Wang, Xiao Hua Zhu e Yue Wei Dai. "A Leakproof Secret Sharing Scheme Based on Environment Sensing". Applied Mechanics and Materials 665 (ottobre 2014): 647–53. http://dx.doi.org/10.4028/www.scientific.net/amm.665.647.
Testo completoYu, Bin, Gang Shen e Zheng-xin Fu. "A Lossless Multi-secret Sharing Visual Cryptography Scheme". Journal of Electronics & Information Technology 34, n. 12 (11 luglio 2013): 2885–90. http://dx.doi.org/10.3724/sp.j.1146.2012.00300.
Testo completoYang, Ching-Nung, Cheng-Hua Chen e Song-Ruei Cai. "Enhanced Boolean-based multi secret image sharing scheme". Journal of Systems and Software 116 (giugno 2016): 22–34. http://dx.doi.org/10.1016/j.jss.2015.01.031.
Testo completoXiao, Heling, e Jingliang Gao. "Multi-party d-Level Quantum Secret Sharing Scheme". International Journal of Theoretical Physics 52, n. 6 (11 gennaio 2013): 2075–82. http://dx.doi.org/10.1007/s10773-012-1481-3.
Testo completoWang, Feng, You-sheng Zhou e Dao-feng Li. "Dynamic threshold changeable multi-policy secret sharing scheme". Security and Communication Networks 8, n. 18 (4 giugno 2015): 3653–58. http://dx.doi.org/10.1002/sec.1288.
Testo completoLi, Zhihui, Xue Jiang e Lu Liu. "Multi-Party Quantum Secret Sharing Based on GHZ State". Entropy 24, n. 10 (8 ottobre 2022): 1433. http://dx.doi.org/10.3390/e24101433.
Testo completoWu, Zhen, Yining Liu e Xingxing Jia. "A Novel Hierarchical Secret Image Sharing Scheme with Multi-Group Joint Management". Mathematics 8, n. 3 (19 marzo 2020): 448. http://dx.doi.org/10.3390/math8030448.
Testo completoLin, Changlu, Huidan Hu, Chin-Chen Chang e Shaohua Tang. "A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction". IEEE Access 6 (2018): 70666–73. http://dx.doi.org/10.1109/access.2018.2880975.
Testo completoZOU, Hui, e Jian-dong WANG. "Multi-level threshold multi-secret sharing scheme with proactive security". Journal of Computer Applications 29, n. 8 (9 ottobre 2009): 2218–19. http://dx.doi.org/10.3724/sp.j.1087.2009.02218.
Testo completoMAN, ZHONG-XIAO, YUN-JIE XIA e ZHAN-JUN ZHANG. "MANY-AGENT CONTROLLED MULTI-PLAYER QUANTUM SECRET SHARING SCHEME". International Journal of Modern Physics C 18, n. 02 (febbraio 2007): 177–85. http://dx.doi.org/10.1142/s0129183107010528.
Testo completoXIAO, Liangliang. "Linear multi-secret sharing schemes". Science in China Series F 48, n. 1 (2005): 125. http://dx.doi.org/10.1360/03yf0599.
Testo completoLin, Cheng-Shian, Chien-Chang Chen e Yu-Cheng Chen. "XOR-Based Progressively Secret Image Sharing". Mathematics 9, n. 6 (12 marzo 2021): 612. http://dx.doi.org/10.3390/math9060612.
Testo completoHa, Yan Yan, Shuai Ji, Wen Cai He e Yao Zhang. "Multi-Secret Sharing Visual Cryptography Scheme Based on XOR Algorithm". Applied Mechanics and Materials 644-650 (settembre 2014): 2108–11. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2108.
Testo completoFu, Zheng Xin, e Bin Yu. "A Modified Multi-Secret Visual Cryptography with Ring Shares". Advanced Engineering Forum 6-7 (settembre 2012): 343–49. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.343.
Testo completoYang, Yu Guang, e Hai Ping Chai. "A Trusted Multi-Party Authentication Scheme Based on Proactive-ElGamal Threshold Secret Sharing System". Applied Mechanics and Materials 235 (novembre 2012): 20–24. http://dx.doi.org/10.4028/www.scientific.net/amm.235.20.
Testo completoQin, Huawang, e Raylin Tso. "High-capacity quantum secret sharing based on orbital angular momentum". Quantum Information and Computation 18, n. 7&8 (giugno 2018): 579–91. http://dx.doi.org/10.26421/qic18.7-8-3.
Testo completoPANG, Liao-Jun, Qing-Qi PEI, Li-Cheng JIAO e Yu-Min WANG. "An Identity (ID)-Based Threshold Multi-Secret Sharing Scheme". Journal of Software 19, n. 10 (20 ottobre 2008): 2739–45. http://dx.doi.org/10.3724/sp.j.1001.2008.02739.
Testo completoWu, Tsu-Yang, e Yuh-Min Tseng. "Publicly verifiable multi-secret sharing scheme from bilinear pairings". IET Information Security 7, n. 3 (1 settembre 2013): 239–46. http://dx.doi.org/10.1049/iet-ifs.2012.0105.
Testo completoChen, Chien-Chang, e Wei-Jie Wu. "A secure Boolean-based multi-secret image sharing scheme". Journal of Systems and Software 92 (giugno 2014): 107–14. http://dx.doi.org/10.1016/j.jss.2014.01.001.
Testo completoYu, Ying, Hongliang Cai, Dan Tang e Wei Yuan. "Multi-secret Image Sharing Scheme based on coding method". IOP Conference Series: Materials Science and Engineering 631 (7 novembre 2019): 052043. http://dx.doi.org/10.1088/1757-899x/631/5/052043.
Testo completoNag, Amitava, Jyoti Prakash Singh e Amit Kumar Singh. "An efficient Boolean based multi-secret image sharing scheme". Multimedia Tools and Applications 79, n. 23-24 (7 giugno 2019): 16219–43. http://dx.doi.org/10.1007/s11042-019-07807-7.
Testo completoMartín del Rey, A. "A multi-secret sharing scheme for 3D solid objects". Expert Systems with Applications 42, n. 4 (marzo 2015): 2114–20. http://dx.doi.org/10.1016/j.eswa.2014.10.035.
Testo completoHsu, Ching-Fang, Qi Cheng, Xueming Tang e Bing Zeng. "An ideal multi-secret sharing scheme based on MSP". Information Sciences 181, n. 7 (1 aprile 2011): 1403–9. http://dx.doi.org/10.1016/j.ins.2010.11.032.
Testo completoLi, Bin. "Bipartite Threshold Multi-Secret Sharing Scheme Based on Hypersphere". American Journal of Computational Mathematics 09, n. 04 (2019): 207–20. http://dx.doi.org/10.4236/ajcm.2019.94016.
Testo completoChen, Chien-Chang, Wei-Jie Wu e Jun-Long Chen. "Highly efficient and secure multi-secret image sharing scheme". Multimedia Tools and Applications 75, n. 12 (3 maggio 2015): 7113–28. http://dx.doi.org/10.1007/s11042-015-2634-1.
Testo completoN, Rukma Rekha, Rolla Subrahmanyam e Subba Rao Y.V. "Multi Group Key Agreement Protocol Using Secret Sharing Scheme". International Journal of Security and Networks 1, n. 1 (2023): 1. http://dx.doi.org/10.1504/ijsn.2023.10056277.
Testo completo