The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for secret with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1982 (16) 1983-1984 (17) 1985-1986 (19) 1987 (16) 1988 (18) 1989 (27) 1990 (21) 1991 (27) 1992 (26) 1993 (36) 1994 (42) 1995 (35) 1996 (49) 1997 (59) 1998 (70) 1999 (81) 2000 (98) 2001 (122) 2002 (174) 2003 (194) 2004 (312) 2005 (434) 2006 (458) 2007 (429) 2008 (506) 2009 (390) 2010 (243) 2011 (236) 2012 (248) 2013 (257) 2014 (312) 2015 (314) 2016 (321) 2017 (330) 2018 (370) 2019 (417) 2020 (390) 2021 (379) 2022 (371) 2023 (386) 2024 (96)
Publication types (Num. hits)
article(3585) book(5) data(1) incollection(39) inproceedings(4669) phdthesis(45) proceedings(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3563 occurrences of 1284 keywords

Results
Found 8349 publication records. Showing 8346 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
118K. Srinathan, N. Tharani Rajan, C. Pandu Rangan Non-perfect Secret Sharing over General Access Structures. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF non-threshold secret sharing, non-perfect secret sharing
91László Csirmaz The Size of a Share Must Be Large. Search on Bibsonomy J. Cryptol. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Polymatroid structures, Polymatroid structures, Secret sharing, Secret sharing, Key words, Ideal secret sharing schemes, Ideal secret sharing schemes, Perfect security, Perfect security
86Giovanni Di Crescenzo Sharing One Secret vs. Sharing Many Secrets: Tight Bounds for the Max Improvement Ratio. Search on Bibsonomy MFCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Multi-Secret Sharing, Cryptography, Secret Sharing
86Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang Changing Thresholds in the Absence of Secure Channels. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Threshold Changeable Secret Sharing, Shamir Secret Sharing, Geometrical Secret Sharing, Secret Sharing
83Reihaneh Safavi-Naini, Huaxiong Wang Secret sharing schemes with partial broadcast channels. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 94A17, 68P30, AMS classifications 94A62
78Shaik Maleka, Amjed Shareef, C. Pandu Rangan The deterministic protocol for rational secret sharing. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
78Gustavus J. Simmons Geometric Shared Secret and/or Shared Control Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
77Jaume Martí-Farré, Carles Padró Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Ideal access structures, Secret sharing representable matroids, Secret sharing, Ideal secret sharing schemes, Information rate
76Phillip Rogaway, Mihir Bellare Robust computational secret sharing and a unified account of classical secret-sharing goals. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF computational secret sharing, robust computational secret-sharing, provable security, cryptographic protocols, secret sharing, survivable storage
76Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF threshold ramp scheme, entropy, random number, Secret sharing scheme, threshold scheme, ideal secret sharing scheme, exclusive-or
74Li Bai A Reliable (k, n) Image Secret Sharing Scheme. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF matrix projection, image processing, secret sharing
73Lein Harn, Changlu Lin Detection and identification of cheaters in ( t , n ) secret sharing scheme. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 94A62
72Oriol Farràs, Jaume Martí-Farré, Carles Padró Ideal Multipartite Secret Sharing Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Ideal access structures, Multipartite secret sharing, Multipartite matroids, Discrete polymatroids, Secret sharing, Ideal secret sharing schemes
68Shlomi Dolev, Limor Lahiani, Moti Yung Secret Swarm UnitReactive k-Secret Sharing. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF mobile computing, secret sharing
67Mihir Bellare, Lenore Cowen, Shafi Goldwasser On the Structure of Secret Key Exchange Protocols. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
67László Csirmaz The Size of a Share Must Be Large. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF polymatroid structures, Secret sharing, ideal secret sharing schemes, perfect security
65Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen Real Perfect Contrast Visual Secret Sharing Schemes with Reversing. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Visual secret sharing scheme, ideal contrast, secret sharing scheme
64Lan Zhou, Willy Susilo, Yi Mu 0001 New Construction of Group Secret Handshakes Based on Pairings. Search on Bibsonomy ICICS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF pairings, random oracle, Secret Handshake, Credential System
64Lan Zhou, Willy Susilo, Yi Mu 0001 Three-Round Secret Handshakes Based on ElGamal and DSA. Search on Bibsonomy ISPEC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Oblivious Signature Based Envelope, Hidden Credential, Privacy, Key Exchange, DSA, ElGamal, Secret Handshake
63Akitoshi Izumi, Yoshifumi Ueshige A proposal of efficient scheme of key management using ID-based encryption and Biometrics. Search on Bibsonomy MUE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
63Chao-Wen Chan, Chin-Chen Chang 0001 Key Exchange Protocols for Multiparty Communication Services. Search on Bibsonomy CW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
62Yi-Chun Wang, Justie Su-tzu Juan Simple Multi-Secret Sharing Schemes to Achieve the Optimal Maximum Improvement Ratio. Search on Bibsonomy SUTC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
62Amos Beimel, Tamir Tassa, Enav Weinreb Characterizing Ideal Weighted Threshold Secret Sharing. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
62Renato M. Capocelli, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro On the Size of Shares for Secret Sharing Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
62Ernest F. Brickell Some Ideal Secret Sharing Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
61Huaxiong Wang, Duncan S. Wong On Secret Reconstruction in Secret Sharing Schemes. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
60Josef Pieprzyk, Xian-Mo Zhang Cheating Prevention in Secret Sharing over GF(pt). Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Nonlinear Secret Sharing, Cheating Immunity, Secret Sharing
58Shaik Maleka, Amjed Shareef, C. Pandu Rangan Rational Secret Sharing with Repeated Games. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distributed computing, game theory, Secret sharing, repeated games
58Chin-Chen Chang 0001, Jun-Chou Chuang, Pei-Yu Lin Sharing a Secret Two-Tone Image in Two Gray-Level Images. Search on Bibsonomy ICPADS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF data encryption, visual cryptography, image hiding, Visual secret sharing
58Renato Renner, Stefan Wolf 0001 New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction. Search on Bibsonomy EUROCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF reductions among primitives, information measures, quantum entanglement purification, Information-theoretic security, secret-key agreement
58Chin-Chen Chang 0001, Tai-Xing Yu Sharing a Secret Gray Image in Multiple Images. Search on Bibsonomy CW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF secret sharing, Visual cryptography
58Sergio Cabello, Carles Padró, Germán Sáez Secret Sharing Schemes with Detection of Cheaters for a General Access Structure. Search on Bibsonomy FCT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Detection of cheaters, Robust and secure schemes, Cryptography, Secret sharing schemes
58Taekyoung Kwon 0002, JooSeok Song Security and efficiency in authentication protocols resistant to password guessing attack. Search on Bibsonomy LCN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF password guessing attack resistance, secret, user-chosen weak secret, security-oriented protocols, cipher operations, protocol steps, poorly-chosen weak secret protection, security, efficiency, cryptographic protocols, key exchange, message authentication, authentication protocols, secure communications, random numbers, dictionary attacks
57Hugo Krawczyk Secret Sharing Made Short. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
57Benny Chor, Eyal Kushilevitz Secret Sharing Over Infinite Domains (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
56Wenping Ma 0002, Fu Tai Zhang New Methods to Construct Cheating Immune Multisecret Sharing Scheme. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Quadratic Function, Cheating Immune Function, Multisecret Secret Sharing, Secret Sharing
56Ching-Nung Yang, Tse-Shih Chen An Image Secret Sharing Scheme with the Capability of Previvewing the Secret Image. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
55Josef Pieprzyk, Xian-Mo Zhang Cheating Prevention in Linear Secret Sharing. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Linear Secret Sharing Schemes, Cheating Identification, Cryptography, Secret Sharing, Cheating Detection
53Vanesa Daza, Josep Domingo-Ferrer On Partial Anonymity in Secret Sharing. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Privacy, Protocols, Secret sharing
53Wieland Fischer, Jean-Pierre Seifert Note on Fast Computation of Secret RSA Exponents. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Carmichael's $lambda$-function, Secret exponent, Short public key, RSA, Chinese Remainder Theorem, Key generation
53Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini Secret Sharing in Multilevel and Compartmented Groups. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Hierarchical and Compartmented Access Structures, Ideal Schemes, Secret Sharing, Perfect Security
53Carlo Blundo, Alfredo De Santis, Roberto de Simone, Ugo Vaccaro Tight Bounds on the Information Rate of Secret Sharing Schemes. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Information Rate and Cryptography, Entropy, Secret Sharing, Data Security
53Woei-Jiunn Tsaur, Shi-Jinn Horng Protocols for Designing a Fast and Perfect Group-Oriented Secret Key Sharing in Distributed Systems. Search on Bibsonomy ISPAN The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Secret Key Sharing Scheme, Distributed Systems, Cryptography, Information Security, Group-Oriented Cryptography
53Mansour Jamzad, Zahra Zahedi Kermani Secure Steganography Using Gabor Filter and Neural Networks. Search on Bibsonomy Trans. Data Hiding Multim. Secur. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Texture similarity, Kohonen Neural Networks, Steganography, DCT, Image database, Gabor Filter
52Tamir Tassa Hierarchical Threshold Secret Sharing. Search on Bibsonomy J. Cryptol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
52Wei Chen, Xiang Long, Yuebin Bai, Xiaopeng Gao A New Dynamic Threshold Secret Sharing Scheme from Bilinear Maps. Search on Bibsonomy ICPP Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
52Maged Hamada Ibrahim Verifiable Threshold Sharing of a Large Secret Safe-Prime. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Robust Threshold Signature Schemes, Multi-Prime RSA, RSA Function Sharing, Threshold Cryptography, VSS
52Lein Harn, Hung-Yu Lin An l-Span Generalized Secret Sharing Scheme. Search on Bibsonomy CRYPTO The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
52Josh Cohen Benaloh, Jerry Leichter Generalized Secret Sharing and Monotone Functions. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
51Brian King Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Linear secret sharing, Randomness requirements, Threshold secret sharing
50Satoshi Obana, Toshinori Araki Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
49Shyong Jian Shyu, Chun-Chieh Chuang, Ying-Ru Chen, Ah-Fur Lai Weighted Threshold Secret Image Sharing. Search on Bibsonomy PSIVT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Weighted shadow size, Chinese remainder theorem, Threshold secret sharing, Secret image sharing
49Jaume Martí-Farré, Carles Padró On Secret Sharing Schemes, Matroids and Polymatroids. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Ideal access structures, Secret sharing, Matroids, Ideal secret sharing schemes, Information rate, Polymatroids
49Hui-Xian Li, Liao-Jun Pang, Wan-Dong Cai An Efficient Threshold Multi-group-Secret Sharing Scheme. Search on Bibsonomy ICFIE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Multi-group-secret sharing, Chinese Remain Theorem, Secret sharing, Threshold
49Hiroki Koga, Etsuyo Ueda Basic Properties of the (t, n)-Threshold Visual Secret Sharing Scheme with Perfect Reconstruction of Black Pixels. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Secret sharing, Visual cryptography, Threshold scheme, Visual secret sharing
49Brian King Requirements for Group Independent Linear Threshold Secret Sharing Schemes. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF linear secret sharing, group independent linear threshold schemes, monotone span programs and bounds on share size, secret sharing, threshold cryptography
49Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe Mutually Trusted Authority-Free Secret Sharing Schemes. Search on Bibsonomy J. Cryptol. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Key words, Secret sharing schemes, Secret sharing schemes
49Brian King A Comment on Group Independent Threshold Sharing. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF integer span programs, group independent threshold schemes, black-box sharing, secret sharing, threshold cryptography, monotone span programs
48Hong-Hao Chen, Cheng-Chi Lee, Chih-Chiang Lee, Hsien-Chu Wu, Chwei-Shyong Tsai Multi-level visual secret sharing scheme with smooth-looking. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF code book, non-pixel expansion shares, visual cryptography, visual secret sharing
48Xiang-Wei Kong, Wen-Feng Liu, Xin-Gang You Secret Message Location Steganalysis Based on Local Coherences of Hue. Search on Bibsonomy PCM (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF locating secret message, the coherences of hue, steganography, steganalysis
48Vinod Vaikuntanathan, Arvind Narayanan, K. Srinathan, C. Pandu Rangan, Kwangjo Kim On the Power of Computational Secret Sharing. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF computationally bounded players, monotone P, Secret sharing, access structures
48Chaosheng Shu, Tsutomu Matsumoto, Hideki Imai A Multi-Purpose Proof System - for Identity and Membership Proofs. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
46Caimei Wang, Zhengmao Li Self-selecting Sub-secret Keys Sharing Scheme Based on Polynomials over Elliptic Curve. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
46Hao Chen, San Ling, Chaoping Xing Access Structures of Elliptic Secret Sharing Schemes. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Nick S. Jones, Lluis Masanes Key Distillation and the Secret-Bit Fraction. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Amos Beimel, Noam Livne, Carles Padró Matroids Can Be Far from Ideal Secret Sharing. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
46Amos Beimel, Matthew K. Franklin Weakly-Private Secret Sharing Schemes. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
46Stanislaw Jarecki, Xiaomin Liu Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. Search on Bibsonomy ACNS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
46Stanislaw Jarecki, Jihye Kim, Gene Tsudik Authentication for Paranoids: Multi-party Secret Handshakes. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Gene Tsudik, Shouhuai Xu A Flexible Framework for Secret Handshakes. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
46Justie Su-tzu Juan, Chia-Li Huang Efficient Secret Sharing Schemes from Room Square. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
46Tamir Tassa Hierarchical Threshold Secret Sharing. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
46Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai Secret-Public Storage Trade-Off for Broadcast Encryption Key Management. Search on Bibsonomy ICICS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF system overheads trade-off, one-way mapping, key management, broadcast encryption, pseudorandom number generators, erasure channels
46Yvo Desmedt, Kaoru Kurosawa, Tri Van Le Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
46Ronald Cramer, Serge Fehr Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
46Chwei-Shyong Tsai, Chin-Chen Chang 0001 A Generalized Secret Image Sharing and Recovery Scheme. Search on Bibsonomy IEEE Pacific Rim Conference on Multimedia The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
46Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
46Carlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro Secret Sharing Schemes with Veto Capabilities. Search on Bibsonomy Algebraic Coding The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
45Stefan Droste New Results on Visual Cryptography. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Secret Sharing Problem, Secret Sharing Scheme, Visual Cryptography
45Josh Cohen Benaloh Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
44Alessandro Sorniotti, Refik Molva Secret interest groups (SIGs) in social networks with an implementation on Facebook. Search on Bibsonomy SAC The full citation details ... 2010 DBLP  DOI  BibTeX  RDF secret interest groups, social networks, secret handshakes
44Abedelaziz Mohaisen, YoungJae Maeng, Jeonil Kang, DaeHun Nyang, KyungHee Lee, Dowon Hong, Jong Wook Han Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network. Search on Bibsonomy UIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF secret information, code attestation, security and system integration, authentication, secret sharing, home network
44Kamer Kaya, Ali Aydin Selçuk A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF joint random secret sharing, Asmuth-Bloom secret sharing scheme, Chinese Remainder Theorem, Verifiability
44Jovan Dj. Golic On Matroid Characterization of Ideal Secret Sharing Schemes. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Matroids, Matroids, Key words, Ideal secret sharing schemes, Ideal secret sharing schemes, Access structures, Access structures
43Tim Berners-Lee, Robert Cailliau, Ari Luotonen, Henrik Frystyk Nielsen, Arthur Secret The World-Wide Web. Search on Bibsonomy Linking the World's Information The full citation details ... 2023 DBLP  DOI  BibTeX  RDF
43Lucas Secret, Eloïse Minder, Jean-Rémy Chardonnet Conect - An application for hybrid conferences. Search on Bibsonomy ISMAR Adjunct The full citation details ... 2021 DBLP  DOI  BibTeX  RDF
43Ghislain Secret, Gil Utard A Study of Reconstruction Process Load in P2P Storage Systems. Search on Bibsonomy Globe The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
43Tim Berners-Lee, Robert Cailliau, Ari Luotonen, Henrik Frystyk Nielsen, Arthur Secret The World-Wide Web. Search on Bibsonomy Commun. ACM The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
43Huawang Qin, Yuewei Dai, Zhiquan Wang A secret sharing scheme based on (t, n) threshold and adversary structure. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Adversary structure, Cryptography, Information security, Secret sharing, Threshold
43Ilker Nadi Bozkurt, Kamer Kaya, Ali Aydin Selçuk Practical Threshold Signatures with Linear Secret Sharing Schemes. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Linear secret sharing, function sharing, threshold cryptography
43Yutaka Kawai, Shotaro Tanno, Takahiro Kondo, Kazuki Yoneyama, Noboru Kunihiro, Kazuo Ohta Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition. Search on Bibsonomy WISA The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Secret Handshake with Multiple Groups, Privacy preserving authentication, Monotone Condition, Anonymity
43Shouhuai Xu, Moti Yung K-Anonymous Multi-party Secret Handshakes. Search on Bibsonomy Financial Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF privacy-preserving authentication, reusable credentials, multiple personality prevention, anonymity, unlinkability, secret handshake, credential systems
43Christophe Tartary, Josef Pieprzyk, Huaxiong Wang Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Threshold Access Structures, Share Verifiability, Keyed One-Way Functions, Chinese Remainder Theorem, Secret Sharing Scheme
43Shoulun Long, Josef Pieprzyk, Huaxiong Wang, Duncan S. Wong Generalised Cumulative Arrays in Secret Sharing. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cumulative array, Perfect hash family, Secret sharing
43Jong-Phil Yang, Kyung Hyune Rhee, Kouichi Sakurai A Proactive Secret Sharing for Server Assisted Threshold Signatures. Search on Bibsonomy HPCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Fault tolerant and Distributed Computing, Secret sharing
43Gene Tsudik, Shouhuai Xu Brief announcement: a flexible framework for secret handshakes. Search on Bibsonomy PODC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF small secret handshakes, unobservability, anonymity, key management, privacy-preservation, credential systems
43Shouhuai Xu, Moti Yung k-anonymous secret handshakes with reusable credentials. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF privacy-preserving authentication, reusable credentials, anonymity, unlinkability, secret handshake, credential systems
43Siaw-Lynn Ng A Representation of a Family of Secret Sharing Matroids. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF projective geometry, matroids, ideal secret sharing schemes
43Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl Asynchronous verifiable secret sharing and proactive cryptosystems. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF model, secret sharing, asynchronous, proactive
43Reina Yoshikawa, Shimin Guo, Kazuhiro Motegi, Yoshihide Igarashi Secret Key Exchange Using Random Deals of Cards on Hierarchical Structures. Search on Bibsonomy ISAAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF hierarchical groups, key exchange graphs, secret bit transmission, information-theoretically secure, card games
Displaying result #1 - #100 of 8346 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license