|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 3563 occurrences of 1284 keywords
|
|
|
Results
Found 8349 publication records. Showing 8346 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
118 | K. Srinathan, N. Tharani Rajan, C. Pandu Rangan |
Non-perfect Secret Sharing over General Access Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2002, Third International Conference on Cryptology in India, Hyderabad, India, December 16-18, 2002, pp. 409-421, 2002, Springer, 3-540-00263-4. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
non-threshold secret sharing, non-perfect secret sharing |
91 | László Csirmaz |
The Size of a Share Must Be Large. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 10(4), pp. 223-231, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Polymatroid structures, Polymatroid structures, Secret sharing, Secret sharing, Key words, Ideal secret sharing schemes, Ideal secret sharing schemes, Perfect security, Perfect security |
86 | Giovanni Di Crescenzo |
Sharing One Secret vs. Sharing Many Secrets: Tight Bounds for the Max Improvement Ratio. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MFCS ![In: Mathematical Foundations of Computer Science 2001, 26th International Symposium, MFCS 2001 Marianske Lazne, Czech Republic, August 27-31, 2001, Proceedings, pp. 292-303, 2001, Springer, 3-540-42496-2. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Multi-Secret Sharing, Cryptography, Secret Sharing |
86 | Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang |
Changing Thresholds in the Absence of Secure Channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 4th Australasian Conference, ACISP'99, Wollongong, NSW, Australia, April 7-9, 1999, Proceedings, pp. 177-191, 1999, Springer, 3-540-65756-8. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Threshold Changeable Secret Sharing, Shamir Secret Sharing, Geometrical Secret Sharing, Secret Sharing |
83 | Reihaneh Safavi-Naini, Huaxiong Wang |
Secret sharing schemes with partial broadcast channels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 41(1), pp. 5-22, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
94A17, 68P30, AMS classifications 94A62 |
78 | Shaik Maleka, Amjed Shareef, C. Pandu Rangan |
The deterministic protocol for rational secret sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IPDPS ![In: 22nd IEEE International Symposium on Parallel and Distributed Processing, IPDPS 2008, Miami, Florida USA, April 14-18, 2008, pp. 1-7, 2008, IEEE. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
78 | Gustavus J. Simmons |
Geometric Shared Secret and/or Shared Control Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '90, 10th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1990, Proceedings, pp. 216-241, 1990, Springer, 3-540-54508-5. The full citation details ...](Pics/full.jpeg) |
1990 |
DBLP DOI BibTeX RDF |
|
77 | Jaume Martí-Farré, Carles Padró |
Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SCN ![In: Security and Cryptography for Networks, 5th International Conference, SCN 2006, Maiori, Italy, September 6-8, 2006, Proceedings, pp. 201-215, 2006, Springer, 3-540-38080-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Ideal access structures, Secret sharing representable matroids, Secret sharing, Ideal secret sharing schemes, Information rate |
76 | Phillip Rogaway, Mihir Bellare |
Robust computational secret sharing and a unified account of classical secret-sharing goals. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 2007 ACM Conference on Computer and Communications Security, CCS 2007, Alexandria, Virginia, USA, October 28-31, 2007, pp. 172-184, 2007, ACM, 978-1-59593-703-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
computational secret sharing, robust computational secret-sharing, provable security, cryptographic protocols, secret sharing, survivable storage |
76 | Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka |
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 11th International Conference, ISC 2008, Taipei, Taiwan, September 15-18, 2008. Proceedings, pp. 455-470, 2008, Springer, 978-3-540-85884-3. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
threshold ramp scheme, entropy, random number, Secret sharing scheme, threshold scheme, ideal secret sharing scheme, exclusive-or |
74 | Li Bai |
A Reliable (k, n) Image Secret Sharing Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
DASC ![In: Second International Symposium on Dependable Autonomic and Secure Computing (DASC 2006), 29 September - 1 October 2006, Indianapolis, Indiana, USA, pp. 31-36, 2006, IEEE Computer Society, 0-7695-2539-3. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
matrix projection, image processing, secret sharing |
73 | Lein Harn, Changlu Lin |
Detection and identification of cheaters in ( t , n ) secret sharing scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 52(1), pp. 15-24, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A62 |
72 | Oriol Farràs, Jaume Martí-Farré, Carles Padró |
Ideal Multipartite Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2007, 26th Annual International Conference on the Theory and Applications of Cryptographic Techniques, Barcelona, Spain, May 20-24, 2007, Proceedings, pp. 448-465, 2007, Springer, 978-3-540-72539-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Ideal access structures, Multipartite secret sharing, Multipartite matroids, Discrete polymatroids, Secret sharing, Ideal secret sharing schemes |
68 | Shlomi Dolev, Limor Lahiani, Moti Yung |
Secret Swarm UnitReactive k-Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2007, 8th International Conference on Cryptology in India, Chennai, India, December 9-13, 2007, Proceedings, pp. 123-137, 2007, Springer, 978-3-540-77025-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
mobile computing, secret sharing |
67 | Mihir Bellare, Lenore Cowen, Shafi Goldwasser |
On the Structure of Secret Key Exchange Protocols. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 604-605, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
67 | László Csirmaz |
The Size of a Share Must Be Large. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '94, Workshop on the Theory and Application of Cryptographic Techniques, Perugia, Italy, May 9-12, 1994, Proceedings, pp. 13-22, 1994, Springer, 3-540-60176-7. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
polymatroid structures, Secret sharing, ideal secret sharing schemes, perfect security |
65 | Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen |
Real Perfect Contrast Visual Secret Sharing Schemes with Reversing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, pp. 433-447, 2006, 3-540-34703-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Visual secret sharing scheme, ideal contrast, secret sharing scheme |
64 | Lan Zhou, Willy Susilo, Yi Mu 0001 |
New Construction of Group Secret Handshakes Based on Pairings. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 9th International Conference, ICICS 2007, Zhengzhou, China, December 12-15, 2007, Proceedings, pp. 16-30, 2007, Springer, 978-3-540-77047-3. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
pairings, random oracle, Secret Handshake, Credential System |
64 | Lan Zhou, Willy Susilo, Yi Mu 0001 |
Three-Round Secret Handshakes Based on ElGamal and DSA. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, Second International Conference, ISPEC 2006, Hangzhou, China, April 11-14, 2006, Proceedings, pp. 332-342, 2006, Springer, 3-540-33052-6. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Oblivious Signature Based Envelope, Hidden Credential, Privacy, Key Exchange, DSA, ElGamal, Secret Handshake |
63 | Akitoshi Izumi, Yoshifumi Ueshige |
A proposal of efficient scheme of key management using ID-based encryption and Biometrics. ![Search on Bibsonomy](Pics/bibsonomy.png) |
MUE ![In: 2007 International Conference on Multimedia and Ubiquitous Engineering (MUE 2007), 26-28 April 2007, Seoul, Korea, pp. 29-34, 2007, IEEE Computer Society, 978-0-7695-2777-2. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
63 | Chao-Wen Chan, Chin-Chen Chang 0001 |
Key Exchange Protocols for Multiparty Communication Services. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: 1st International Symposium on Cyber Worlds (CW 2002), 6-8 November 2002, Tokyo, Japan, pp. 241-248, 2002, IEEE Computer Society, 0-7695-1862-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
62 | Yi-Chun Wang, Justie Su-tzu Juan |
Simple Multi-Secret Sharing Schemes to Achieve the Optimal Maximum Improvement Ratio. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SUTC (2) ![In: IEEE International Conference on Sensor Networks, Ubiquitous, and Trustworthy Computing (SUTC 2006), 5-7 June 2006, Taichung, Taiwan, pp. 58-63, 2006, IEEE Computer Society, 0-7695-2553-9. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
62 | Amos Beimel, Tamir Tassa, Enav Weinreb |
Characterizing Ideal Weighted Threshold Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Second Theory of Cryptography Conference, TCC 2005, Cambridge, MA, USA, February 10-12, 2005, Proceedings, pp. 600-619, 2005, Springer, 3-540-24573-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
62 | Renato M. Capocelli, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro |
On the Size of Shares for Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '91, 11th Annual International Cryptology Conference, Santa Barbara, California, USA, August 11-15, 1991, Proceedings, pp. 101-113, 1991, Springer, 3-540-55188-3. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
62 | Ernest F. Brickell |
Some Ideal Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT '89, Workshop on the Theory and Application of of Cryptographic Techniques, Houthalen, Belgium, April 10-13, 1989, Proceedings, pp. 468-475, 1989, Springer, 3-540-53433-4. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
61 | Huaxiong Wang, Duncan S. Wong |
On Secret Reconstruction in Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 54(1), pp. 473-480, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
60 | Josef Pieprzyk, Xian-Mo Zhang |
Cheating Prevention in Secret Sharing over GF(pt). ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2001, Second International Conference on Cryptology in India, Chennai, India, December 16-20, 2001, Proceedings, pp. 79-90, 2001, Springer, 3-540-43010-5. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Nonlinear Secret Sharing, Cheating Immunity, Secret Sharing |
58 | Shaik Maleka, Amjed Shareef, C. Pandu Rangan |
Rational Secret Sharing with Repeated Games. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPEC ![In: Information Security Practice and Experience, 4th International Conference, ISPEC 2008, Sydney, Australia, April 21-23, 2008, Proceedings, pp. 334-346, 2008, Springer, 978-3-540-79103-4. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
distributed computing, game theory, Secret sharing, repeated games |
58 | Chin-Chen Chang 0001, Jun-Chou Chuang, Pei-Yu Lin |
Sharing a Secret Two-Tone Image in Two Gray-Level Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPADS (2) ![In: 11th International Conference on Parallel and Distributed Systems, ICPADS 2005, Fuduoka, Japan, July 20-22, 2005, pp. 300-304, 2005, IEEE Computer Society, 0-7695-2281-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
data encryption, visual cryptography, image hiding, Visual secret sharing |
58 | Renato Renner, Stefan Wolf 0001 |
New Bounds in Secret-Key Agreement: The Gap between Formation and Secrecy Extraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EUROCRYPT ![In: Advances in Cryptology - EUROCRYPT 2003, International Conference on the Theory and Applications of Cryptographic Techniques, Warsaw, Poland, May 4-8, 2003, Proceedings, pp. 562-577, 2003, Springer, 3-540-14039-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
reductions among primitives, information measures, quantum entanglement purification, Information-theoretic security, secret-key agreement |
58 | Chin-Chen Chang 0001, Tai-Xing Yu |
Sharing a Secret Gray Image in Multiple Images. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CW ![In: 1st International Symposium on Cyber Worlds (CW 2002), 6-8 November 2002, Tokyo, Japan, pp. 230-240, 2002, IEEE Computer Society, 0-7695-1862-1. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
secret sharing, Visual cryptography |
58 | Sergio Cabello, Carles Padró, Germán Sáez |
Secret Sharing Schemes with Detection of Cheaters for a General Access Structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
FCT ![In: Fundamentals of Computation Theory, 12th International Symposium, FCT '99, Iasi, Romania, August 30 - September 3, 1999, Proceedings, pp. 185-194, 1999, Springer, 3-540-66412-2. The full citation details ...](Pics/full.jpeg) |
1999 |
DBLP DOI BibTeX RDF |
Detection of cheaters, Robust and secure schemes, Cryptography, Secret sharing schemes |
58 | Taekyoung Kwon 0002, JooSeok Song |
Security and efficiency in authentication protocols resistant to password guessing attack. ![Search on Bibsonomy](Pics/bibsonomy.png) |
LCN ![In: 22nd IEEE Conference on Local Computer Networks (LCN '97), 2-5 November 1997, Minneapolis, Minnesota, USA, Proceedings, pp. 245-252, 1997, IEEE Computer Society, 0-8186-8141-1. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
password guessing attack resistance, secret, user-chosen weak secret, security-oriented protocols, cipher operations, protocol steps, poorly-chosen weak secret protection, security, efficiency, cryptographic protocols, key exchange, message authentication, authentication protocols, secure communications, random numbers, dictionary attacks |
57 | Hugo Krawczyk |
Secret Sharing Made Short. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '93, 13th Annual International Cryptology Conference, Santa Barbara, California, USA, August 22-26, 1993, Proceedings, pp. 136-146, 1993, Springer, 3-540-57766-1. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
57 | Benny Chor, Eyal Kushilevitz |
Secret Sharing Over Infinite Domains (Extended Abstract). ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '89, 9th Annual International Cryptology Conference, Santa Barbara, California, USA, August 20-24, 1989, Proceedings, pp. 299-306, 1989, Springer, 3-540-97317-6. The full citation details ...](Pics/full.jpeg) |
1989 |
DBLP DOI BibTeX RDF |
|
56 | Wenping Ma 0002, Fu Tai Zhang |
New Methods to Construct Cheating Immune Multisecret Sharing Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CISC ![In: Information Security and Cryptology, First SKLOIS Conference, CISC 2005, Beijing, China, December 15-17, 2005, Proceedings, pp. 384-394, 2005, Springer, 3-540-30855-5. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Quadratic Function, Cheating Immune Function, Multisecret Secret Sharing, Secret Sharing |
56 | Ching-Nung Yang, Tse-Shih Chen |
An Image Secret Sharing Scheme with the Capability of Previvewing the Secret Image. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICME ![In: Proceedings of the 2007 IEEE International Conference on Multimedia and Expo, ICME 2007, July 2-5, 2007, Beijing, China, pp. 1535-1538, 2007, IEEE Computer Society, 1-4244-1017-7. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
55 | Josef Pieprzyk, Xian-Mo Zhang |
Cheating Prevention in Linear Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 121-135, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Linear Secret Sharing Schemes, Cheating Identification, Cryptography, Secret Sharing, Cheating Detection |
53 | Vanesa Daza, Josep Domingo-Ferrer |
On Partial Anonymity in Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
EuroPKI ![In: Public Key Infrastructure, 4th European PKI Workshop: Theory and Practice, EuroPKI 2007, Palma de Mallorca, Spain, June 28-30, 2007, Proceedings, pp. 193-202, 2007, Springer, 978-3-540-73407-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Privacy, Protocols, Secret sharing |
53 | Wieland Fischer, Jean-Pierre Seifert |
Note on Fast Computation of Secret RSA Exponents. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 136-143, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
Carmichael's $lambda$-function, Secret exponent, Short public key, RSA, Chinese Remainder Theorem, Key generation |
53 | Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini |
Secret Sharing in Multilevel and Compartmented Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, Third Australasian Conference, ACISP'98, Brisbane, Queensland, Australia, July 1998, Proceedings, pp. 367-378, 1998, Springer, 3-540-64732-5. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Hierarchical and Compartmented Access Structures, Ideal Schemes, Secret Sharing, Perfect Security |
53 | Carlo Blundo, Alfredo De Santis, Roberto de Simone, Ugo Vaccaro |
Tight Bounds on the Information Rate of Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 11(2), pp. 107-122, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Information Rate and Cryptography, Entropy, Secret Sharing, Data Security |
53 | Woei-Jiunn Tsaur, Shi-Jinn Horng |
Protocols for Designing a Fast and Perfect Group-Oriented Secret Key Sharing in Distributed Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISPAN ![In: 1996 International Symposium on Parallel Architectures, Algorithms and Networks (ISPAN '96), June 12-14, 1996, Beijing, China, pp. 326-329, 1996, IEEE Computer Society, 0-8186-7460-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Secret Key Sharing Scheme, Distributed Systems, Cryptography, Information Security, Group-Oriented Cryptography |
53 | Mansour Jamzad, Zahra Zahedi Kermani |
Secure Steganography Using Gabor Filter and Neural Networks. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Trans. Data Hiding Multim. Secur. ![In: Transactions on Data Hiding and Multimedia Security III, pp. 33-49, 2008, Springer, 978-3-540-69016-0. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Texture similarity, Kohonen Neural Networks, Steganography, DCT, Image database, Gabor Filter |
52 | Tamir Tassa |
Hierarchical Threshold Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 20(2), pp. 237-264, 2007. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Wei Chen, Xiang Long, Yuebin Bai, Xiaopeng Gao |
A New Dynamic Threshold Secret Sharing Scheme from Bilinear Maps. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICPP Workshops ![In: 2007 International Conference on Parallel Processing Workshops (ICPP Workshops 2007), 10-14 September 2007, Xi-An, China, pp. 19, 2007, IEEE Computer Society, 978-0-7695-2934-9. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
52 | Maged Hamada Ibrahim |
Verifiable Threshold Sharing of a Large Secret Safe-Prime. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ITCC (1) ![In: International Symposium on Information Technology: Coding and Computing (ITCC 2005), Volume 1, 4-6 April 2005, Las Vegas, Nevada, USA, pp. 608-613, 2005, IEEE Computer Society, 0-7695-2315-3. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
Robust Threshold Signature Schemes, Multi-Prime RSA, RSA Function Sharing, Threshold Cryptography, VSS |
52 | Lein Harn, Hung-Yu Lin |
An l-Span Generalized Secret Sharing Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '92, 12th Annual International Cryptology Conference, Santa Barbara, California, USA, August 16-20, 1992, Proceedings, pp. 558-565, 1992, Springer, 3-540-57340-2. The full citation details ...](Pics/full.jpeg) |
1992 |
DBLP DOI BibTeX RDF |
|
52 | Josh Cohen Benaloh, Jerry Leichter |
Generalized Secret Sharing and Monotone Functions. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '88, 8th Annual International Cryptology Conference, Santa Barbara, California, USA, August 21-25, 1988, Proceedings, pp. 27-35, 1988, Springer, 3-540-97196-3. The full citation details ...](Pics/full.jpeg) |
1988 |
DBLP DOI BibTeX RDF |
|
51 | Brian King |
Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 6th Australasian Conference, ACISP 2001, Sydney, Australia, July 11-13, 2001, Proceedings, pp. 376-391, 2001, Springer, 3-540-42300-1. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
Linear secret sharing, Randomness requirements, Threshold secret sharing |
50 | Satoshi Obana, Toshinori Araki |
Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT 2006, 12th International Conference on the Theory and Application of Cryptology and Information Security, Shanghai, China, December 3-7, 2006, Proceedings, pp. 364-379, 2006, Springer, 3-540-49475-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
49 | Shyong Jian Shyu, Chun-Chieh Chuang, Ying-Ru Chen, Ah-Fur Lai |
Weighted Threshold Secret Image Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PSIVT ![In: Advances in Image and Video Technology, Third Pacific Rim Symposium, PSIVT 2009, Tokyo, Japan, January 13-16, 2009. Proceedings, pp. 988-998, 2009, Springer, 978-3-540-92956-7. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Weighted shadow size, Chinese remainder theorem, Threshold secret sharing, Secret image sharing |
49 | Jaume Martí-Farré, Carles Padró |
On Secret Sharing Schemes, Matroids and Polymatroids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings, pp. 273-290, 2007, Springer, 3-540-70935-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Ideal access structures, Secret sharing, Matroids, Ideal secret sharing schemes, Information rate, Polymatroids |
49 | Hui-Xian Li, Liao-Jun Pang, Wan-Dong Cai |
An Efficient Threshold Multi-group-Secret Sharing Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICFIE ![In: Fuzzy Information and Engineering, Proceedings of the Second International Conference of Fuzzy Information and Engineering, ICFIE 2007, May 13-16, 2007, Guangzhou, China, pp. 911-918, 2007, Springer, 978-3-540-71440-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Multi-group-secret sharing, Chinese Remain Theorem, Secret sharing, Threshold |
49 | Hiroki Koga, Etsuyo Ueda |
Basic Properties of the (t, n)-Threshold Visual Secret Sharing Scheme with Perfect Reconstruction of Black Pixels. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 40(1), pp. 81-102, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Secret sharing, Visual cryptography, Threshold scheme, Visual secret sharing |
49 | Brian King |
Requirements for Group Independent Linear Threshold Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACISP ![In: Information Security and Privacy, 7th Australian Conference, ACISP 2002, Melbourne, Australia, July 3-5, 2002, Proceedings, pp. 89-106, 2002, Springer, 3-540-43861-0. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
linear secret sharing, group independent linear threshold schemes, monotone span programs and bounds on share size, secret sharing, threshold cryptography |
49 | Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe |
Mutually Trusted Authority-Free Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 10(4), pp. 261-289, 1997. The full citation details ...](Pics/full.jpeg) |
1997 |
DBLP DOI BibTeX RDF |
Key words, Secret sharing schemes, Secret sharing schemes |
49 | Brian King |
A Comment on Group Independent Threshold Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 4th International Workshop, WISA 2003, Jeju Island, Korea, August 25-27, 2003, Revised Papers, pp. 425-441, 2003, Springer, 3-540-20827-5. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
integer span programs, group independent threshold schemes, black-box sharing, secret sharing, threshold cryptography, monotone span programs |
48 | Hong-Hao Chen, Cheng-Chi Lee, Chih-Chiang Lee, Hsien-Chu Wu, Chwei-Shyong Tsai |
Multi-level visual secret sharing scheme with smooth-looking. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICIS ![In: Proceedings of the 2nd International Conference on Interaction Sciences: Information Technology, Culture and Human (ICIS 2009), Seoul, Korea, 24-26 November 2009, pp. 155-160, 2009, ACM, 978-1-60558-710-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
code book, non-pixel expansion shares, visual cryptography, visual secret sharing |
48 | Xiang-Wei Kong, Wen-Feng Liu, Xin-Gang You |
Secret Message Location Steganalysis Based on Local Coherences of Hue. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PCM (2) ![In: Advances in Multimedia Information Processing - PCM 2005, 6th Pacific-Rim Conference on Multimedia, Jeju Island, Korea, November 13-16, 2005, Proceedings, Part II, pp. 301-311, 2005, Springer, 3-540-30040-6. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
locating secret message, the coherences of hue, steganography, steganalysis |
48 | Vinod Vaikuntanathan, Arvind Narayanan, K. Srinathan, C. Pandu Rangan, Kwangjo Kim |
On the Power of Computational Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2003, 4th International Conference on Cryptology in India, New Delhi, India, December 8-10, 2003, Proceedings, pp. 162-176, 2003, Springer, 3-540-20609-4. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
computationally bounded players, monotone P, Secret sharing, access structures |
48 | Chaosheng Shu, Tsutomu Matsumoto, Hideki Imai |
A Multi-Purpose Proof System - for Identity and Membership Proofs. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ASIACRYPT ![In: Advances in Cryptology - ASIACRYPT '91, International Conference on the Theory and Applications of Cryptology, Fujiyoshida, Japan, November 11-14, 1991, Proceedings, pp. 397-411, 1991, Springer, 3-540-57332-1. The full citation details ...](Pics/full.jpeg) |
1991 |
DBLP DOI BibTeX RDF |
|
46 | Caimei Wang, Zhengmao Li |
Self-selecting Sub-secret Keys Sharing Scheme Based on Polynomials over Elliptic Curve. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IAS ![In: Proceedings of the Fifth International Conference on Information Assurance and Security, IAS 2009, Xi'An, China, 18-20 August 2009, pp. 734-737, 2009, IEEE Computer Society, 978-0-7695-3744-3. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
|
46 | Hao Chen, San Ling, Chaoping Xing |
Access Structures of Elliptic Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 54(2), pp. 850-852, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Nick S. Jones, Lluis Masanes |
Key Distillation and the Secret-Bit Fraction. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Trans. Inf. Theory ![In: IEEE Trans. Inf. Theory 54(2), pp. 680-691, 2008. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Amos Beimel, Noam Livne, Carles Padró |
Matroids Can Be Far from Ideal Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, Fifth Theory of Cryptography Conference, TCC 2008, New York, USA, March 19-21, 2008., pp. 194-212, 2008, Springer, 978-3-540-78523-1. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
46 | Amos Beimel, Matthew K. Franklin |
Weakly-Private Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings, pp. 253-272, 2007, Springer, 3-540-70935-5. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Stanislaw Jarecki, Xiaomin Liu |
Unlinkable Secret Handshakes and Key-Private Group Key Management Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 5th International Conference, ACNS 2007, Zhuhai, China, June 5-8, 2007, Proceedings, pp. 270-287, 2007, Springer, 978-3-540-72737-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
|
46 | Stanislaw Jarecki, Jihye Kim, Gene Tsudik |
Authentication for Paranoids: Multi-party Secret Handshakes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ACNS ![In: Applied Cryptography and Network Security, 4th International Conference, ACNS 2006, Singapore, June 6-9, 2006, Proceedings, pp. 325-339, 2006, 3-540-34703-8. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Gene Tsudik, Shouhuai Xu |
A Flexible Framework for Secret Handshakes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Privacy Enhancing Technologies ![In: Privacy Enhancing Technologies, 6th International Workshop, PET 2006, Cambridge, UK, June 28-30, 2006, Revised Selected Papers, pp. 295-315, 2006, Springer, 3-540-68790-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
|
46 | Justie Su-tzu Juan, Chia-Li Huang |
Efficient Secret Sharing Schemes from Room Square. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICITA (2) ![In: Third International Conference on Information Technology and Applications (ICITA 2005), 4-7 July 2005, Sydney, Australia, pp. 477-481, 2005, IEEE Computer Society, 0-7695-2316-1. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
|
46 | Tamir Tassa |
Hierarchical Threshold Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
TCC ![In: Theory of Cryptography, First Theory of Cryptography Conference, TCC 2004, Cambridge, MA, USA, February 19-21, 2004, Proceedings, pp. 473-490, 2004, Springer, 3-540-21000-8. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
|
46 | Miodrag J. Mihaljevic, Marc P. C. Fossorier, Hideki Imai |
Secret-Public Storage Trade-Off for Broadcast Encryption Key Management. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ICICS ![In: Information and Communications Security, 6th International Conference, ICICS 2004, Malaga, Spain, October 27-29, 2004, Proceedings, pp. 375-387, 2004, Springer, 3-540-23563-9. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
system overheads trade-off, one-way mapping, key management, broadcast encryption, pseudorandom number generators, erasure channels |
46 | Yvo Desmedt, Kaoru Kurosawa, Tri Van Le |
Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISC ![In: Information Security, 6th International Conference, ISC 2003, Bristol, UK, October 1-3, 2003, Proceedings, pp. 396-407, 2003, Springer, 3-540-20176-9. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
|
46 | Ronald Cramer, Serge Fehr |
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO 2002, 22nd Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 2002, Proceedings, pp. 272-287, 2002, Springer, 3-540-44050-X. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
|
46 | Chwei-Shyong Tsai, Chin-Chen Chang 0001 |
A Generalized Secret Image Sharing and Recovery Scheme. ![Search on Bibsonomy](Pics/bibsonomy.png) |
IEEE Pacific Rim Conference on Multimedia ![In: Advances in Multimedia Information Processing - PCM 2001, Second IEEE Pacific Rim Conference on Multimedia, Bejing, China, October 24-26, 2001, Proceedings, pp. 963-968, 2001, Springer, 3-540-42680-9. The full citation details ...](Pics/full.jpeg) |
2001 |
DBLP DOI BibTeX RDF |
|
46 | Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung |
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '95, 15th Annual International Cryptology Conference, Santa Barbara, California, USA, August 27-31, 1995, Proceedings, pp. 339-352, 1995, Springer, 3-540-60221-6. The full citation details ...](Pics/full.jpeg) |
1995 |
DBLP DOI BibTeX RDF |
|
46 | Carlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro |
Secret Sharing Schemes with Veto Capabilities. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Algebraic Coding ![In: Algebraic Coding, First French-Israeli Workshop, Paris, France, July 19-21, 1993, Proceedings, pp. 82-89, 1993, Springer, 3-540-57843-9. The full citation details ...](Pics/full.jpeg) |
1993 |
DBLP DOI BibTeX RDF |
|
45 | Stefan Droste |
New Results on Visual Cryptography. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '96, 16th Annual International Cryptology Conference, Santa Barbara, California, USA, August 18-22, 1996, Proceedings, pp. 401-415, 1996, Springer, 3-540-61512-1. The full citation details ...](Pics/full.jpeg) |
1996 |
DBLP DOI BibTeX RDF |
Secret Sharing Problem, Secret Sharing Scheme, Visual Cryptography |
45 | Josh Cohen Benaloh |
Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CRYPTO ![In: Advances in Cryptology - CRYPTO '86, Santa Barbara, California, USA, 1986, Proceedings, pp. 251-260, 1986, Springer. The full citation details ...](Pics/full.jpeg) |
1986 |
DBLP DOI BibTeX RDF |
|
44 | Alessandro Sorniotti, Refik Molva |
Secret interest groups (SIGs) in social networks with an implementation on Facebook. ![Search on Bibsonomy](Pics/bibsonomy.png) |
SAC ![In: Proceedings of the 2010 ACM Symposium on Applied Computing (SAC), Sierre, Switzerland, March 22-26, 2010, pp. 621-628, 2010, ACM, 978-1-60558-639-7. The full citation details ...](Pics/full.jpeg) |
2010 |
DBLP DOI BibTeX RDF |
secret interest groups, social networks, secret handshakes |
44 | Abedelaziz Mohaisen, YoungJae Maeng, Jeonil Kang, DaeHun Nyang, KyungHee Lee, Dowon Hong, Jong Wook Han |
Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network. ![Search on Bibsonomy](Pics/bibsonomy.png) |
UIC ![In: Ubiquitous Intelligence and Computing, 5th International Conference, UIC 2008, Oslo, Norway, June 23-25, 2008, Proceedings, pp. 548-562, 2008, Springer, 978-3-540-69292-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
secret information, code attestation, security and system integration, authentication, secret sharing, home network |
44 | Kamer Kaya, Ali Aydin Selçuk |
A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem. ![Search on Bibsonomy](Pics/bibsonomy.png) |
INDOCRYPT ![In: Progress in Cryptology - INDOCRYPT 2008, 9th International Conference on Cryptology in India, Kharagpur, India, December 14-17, 2008. Proceedings, pp. 414-425, 2008, Springer, 978-3-540-89753-8. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
joint random secret sharing, Asmuth-Bloom secret sharing scheme, Chinese Remainder Theorem, Verifiability |
44 | Jovan Dj. Golic |
On Matroid Characterization of Ideal Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
J. Cryptol. ![In: J. Cryptol. 11(2), pp. 75-86, 1998. The full citation details ...](Pics/full.jpeg) |
1998 |
DBLP DOI BibTeX RDF |
Matroids, Matroids, Key words, Ideal secret sharing schemes, Ideal secret sharing schemes, Access structures, Access structures |
43 | Tim Berners-Lee, Robert Cailliau, Ari Luotonen, Henrik Frystyk Nielsen, Arthur Secret |
The World-Wide Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Linking the World's Information ![In: Linking the World's Information - Essays on Tim Berners-Lee's Invention of the World Wide Web, pp. 51-65, 2023, ACM, 979-8-4007-0794-0. The full citation details ...](Pics/full.jpeg) |
2023 |
DBLP DOI BibTeX RDF |
|
43 | Lucas Secret, Eloïse Minder, Jean-Rémy Chardonnet |
Conect - An application for hybrid conferences. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISMAR Adjunct ![In: IEEE International Symposium on Mixed and Augmented Reality Adjunct, ISMAR 2021 Adjunct, Bari, Italy, October 4-8, 2021, pp. 447-448, 2021, IEEE, 978-1-6654-1298-8. The full citation details ...](Pics/full.jpeg) |
2021 |
DBLP DOI BibTeX RDF |
|
43 | Ghislain Secret, Gil Utard |
A Study of Reconstruction Process Load in P2P Storage Systems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Globe ![In: Data Management in Grid and Peer-to-Peer Systems, First International Conference, Globe 2008, Turin, Italy, September 3, 2008. Proceedings, pp. 12-21, 2008, Springer, 978-3-540-85175-2. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
|
43 | Tim Berners-Lee, Robert Cailliau, Ari Luotonen, Henrik Frystyk Nielsen, Arthur Secret |
The World-Wide Web. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Commun. ACM ![In: Commun. ACM 37(8), pp. 76-82, 1994. The full citation details ...](Pics/full.jpeg) |
1994 |
DBLP DOI BibTeX RDF |
|
43 | Huawang Qin, Yuewei Dai, Zhiquan Wang |
A secret sharing scheme based on (t, n) threshold and adversary structure. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Int. J. Inf. Sec. ![In: Int. J. Inf. Sec. 8(5), pp. 379-385, 2009. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Adversary structure, Cryptography, Information security, Secret sharing, Threshold |
43 | Ilker Nadi Bozkurt, Kamer Kaya, Ali Aydin Selçuk |
Practical Threshold Signatures with Linear Secret Sharing Schemes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
AFRICACRYPT ![In: Progress in Cryptology - AFRICACRYPT 2009, Second International Conference on Cryptology in Africa, Gammarth, Tunisia, June 21-25, 2009. Proceedings, pp. 167-178, 2009, Springer, 978-3-642-02383-5. The full citation details ...](Pics/full.jpeg) |
2009 |
DBLP DOI BibTeX RDF |
Linear secret sharing, function sharing, threshold cryptography |
43 | Yutaka Kawai, Shotaro Tanno, Takahiro Kondo, Kazuki Yoneyama, Noboru Kunihiro, Kazuo Ohta |
Extension of Secret Handshake Protocols with Multiple Groups in Monotone Condition. ![Search on Bibsonomy](Pics/bibsonomy.png) |
WISA ![In: Information Security Applications, 9th International Workshop, WISA 2008, Jeju Island, Korea, September 23-25, 2008, Revised Selected Papers, pp. 160-173, 2008, Springer, 978-3-642-00305-9. The full citation details ...](Pics/full.jpeg) |
2008 |
DBLP DOI BibTeX RDF |
Secret Handshake with Multiple Groups, Privacy preserving authentication, Monotone Condition, Anonymity |
43 | Shouhuai Xu, Moti Yung |
K-Anonymous Multi-party Secret Handshakes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Financial Cryptography ![In: Financial Cryptography and Data Security, 11th International Conference, FC 2007, and 1st International Workshop on Usable Security, USEC 2007, Scarborough, Trinidad and Tobago, February 12-16, 2007. Revised Selected Papers, pp. 72-87, 2007, Springer, 978-3-540-77365-8. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
privacy-preserving authentication, reusable credentials, multiple personality prevention, anonymity, unlinkability, secret handshake, credential systems |
43 | Christophe Tartary, Josef Pieprzyk, Huaxiong Wang |
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Inscrypt ![In: Information Security and Cryptology, Third SKLOIS Conference, Inscrypt 2007, Xining, China, August 31 - September 5, 2007, Revised Selected Papers, pp. 167-181, 2007, Springer, 978-3-540-79498-1. The full citation details ...](Pics/full.jpeg) |
2007 |
DBLP DOI BibTeX RDF |
Threshold Access Structures, Share Verifiability, Keyed One-Way Functions, Chinese Remainder Theorem, Secret Sharing Scheme |
43 | Shoulun Long, Josef Pieprzyk, Huaxiong Wang, Duncan S. Wong |
Generalised Cumulative Arrays in Secret Sharing. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 40(2), pp. 191-209, 2006. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Cumulative array, Perfect hash family, Secret sharing |
43 | Jong-Phil Yang, Kyung Hyune Rhee, Kouichi Sakurai |
A Proactive Secret Sharing for Server Assisted Threshold Signatures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
HPCC ![In: High Performance Computing and Communications, Second International Conference, HPCC 2006, Munich, Germany, September 13-15, 2006, Proceedings, pp. 250-259, 2006, Springer, 3-540-39368-4. The full citation details ...](Pics/full.jpeg) |
2006 |
DBLP DOI BibTeX RDF |
Fault tolerant and Distributed Computing, Secret sharing |
43 | Gene Tsudik, Shouhuai Xu |
Brief announcement: a flexible framework for secret handshakes. ![Search on Bibsonomy](Pics/bibsonomy.png) |
PODC ![In: Proceedings of the Twenty-Fourth Annual ACM Symposium on Principles of Distributed Computing, PODC 2005, Las Vegas, NV, USA, July 17-20, 2005, pp. 39, 2005, ACM, 1-58113-994-2. The full citation details ...](Pics/full.jpeg) |
2005 |
DBLP DOI BibTeX RDF |
small secret handshakes, unobservability, anonymity, key management, privacy-preservation, credential systems |
43 | Shouhuai Xu, Moti Yung |
k-anonymous secret handshakes with reusable credentials. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 11th ACM Conference on Computer and Communications Security, CCS 2004, Washington, DC, USA, October 25-29, 2004, pp. 158-167, 2004, ACM, 1-58113-961-6. The full citation details ...](Pics/full.jpeg) |
2004 |
DBLP DOI BibTeX RDF |
privacy-preserving authentication, reusable credentials, anonymity, unlinkability, secret handshake, credential systems |
43 | Siaw-Lynn Ng |
A Representation of a Family of Secret Sharing Matroids. ![Search on Bibsonomy](Pics/bibsonomy.png) |
Des. Codes Cryptogr. ![In: Des. Codes Cryptogr. 30(1), pp. 5-19, 2003. The full citation details ...](Pics/full.jpeg) |
2003 |
DBLP DOI BibTeX RDF |
projective geometry, matroids, ideal secret sharing schemes |
43 | Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl |
Asynchronous verifiable secret sharing and proactive cryptosystems. ![Search on Bibsonomy](Pics/bibsonomy.png) |
CCS ![In: Proceedings of the 9th ACM Conference on Computer and Communications Security, CCS 2002, Washington, DC, USA, November 18-22, 2002, pp. 88-97, 2002, ACM, 1-58113-612-9. The full citation details ...](Pics/full.jpeg) |
2002 |
DBLP DOI BibTeX RDF |
model, secret sharing, asynchronous, proactive |
43 | Reina Yoshikawa, Shimin Guo, Kazuhiro Motegi, Yoshihide Igarashi |
Secret Key Exchange Using Random Deals of Cards on Hierarchical Structures. ![Search on Bibsonomy](Pics/bibsonomy.png) |
ISAAC ![In: Algorithms and Computation, 11th International Conference, ISAAC 2000, Taipei, Taiwan, December 18-20, 2000, Proceedings, pp. 290-301, 2000, Springer, 3-540-41255-7. The full citation details ...](Pics/full.jpeg) |
2000 |
DBLP DOI BibTeX RDF |
hierarchical groups, key exchange graphs, secret bit transmission, information-theoretically secure, card games |
Displaying result #1 - #100 of 8346 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|