The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase secret-sharing (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1983-1989 (15) 1990-1992 (28) 1993-1994 (33) 1995 (16) 1996 (24) 1997 (21) 1998 (22) 1999 (28) 2000 (27) 2001 (27) 2002 (51) 2003 (57) 2004 (59) 2005 (110) 2006 (108) 2007 (87) 2008 (127) 2009 (110) 2010 (97) 2011 (126) 2012 (119) 2013 (132) 2014 (148) 2015 (152) 2016 (140) 2017 (133) 2018 (172) 2019 (199) 2020 (205) 2021 (193) 2022 (150) 2023 (177) 2024 (46)
Publication types (Num. hits)
article(1705) book(3) incollection(16) inproceedings(1398) phdthesis(17)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 756 occurrences of 312 keywords

Results
Found 3139 publication records. Showing 3139 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
171K. Srinathan, N. Tharani Rajan, C. Pandu Rangan Non-perfect Secret Sharing over General Access Structures. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF non-threshold secret sharing, non-perfect secret sharing
137Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang Changing Thresholds in the Absence of Secure Channels. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Threshold Changeable Secret Sharing, Shamir Secret Sharing, Geometrical Secret Sharing, Secret Sharing
131László Csirmaz The Size of a Share Must Be Large. Search on Bibsonomy J. Cryptol. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Polymatroid structures, Polymatroid structures, Secret sharing, Secret sharing, Key words, Ideal secret sharing schemes, Ideal secret sharing schemes, Perfect security, Perfect security
124Jaume Martí-Farré, Carles Padró Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Ideal access structures, Secret sharing representable matroids, Secret sharing, Ideal secret sharing schemes, Information rate
120Reihaneh Safavi-Naini, Huaxiong Wang Secret sharing schemes with partial broadcast channels. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 94A17, 68P30, AMS classifications 94A62
119Phillip Rogaway, Mihir Bellare Robust computational secret sharing and a unified account of classical secret-sharing goals. Search on Bibsonomy CCS The full citation details ... 2007 DBLP  DOI  BibTeX  RDF computational secret sharing, robust computational secret-sharing, provable security, cryptographic protocols, secret sharing, survivable storage
116Giovanni Di Crescenzo Sharing One Secret vs. Sharing Many Secrets: Tight Bounds for the Max Improvement Ratio. Search on Bibsonomy MFCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Multi-Secret Sharing, Cryptography, Secret Sharing
116Oriol Farràs, Jaume Martí-Farré, Carles Padró Ideal Multipartite Secret Sharing Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Ideal access structures, Multipartite secret sharing, Multipartite matroids, Discrete polymatroids, Secret sharing, Ideal secret sharing schemes
106Shaik Maleka, Amjed Shareef, C. Pandu Rangan The deterministic protocol for rational secret sharing. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
106Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF threshold ramp scheme, entropy, random number, Secret sharing scheme, threshold scheme, ideal secret sharing scheme, exclusive-or
102Li Bai A Reliable (k, n) Image Secret Sharing Scheme. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF matrix projection, image processing, secret sharing
98Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen Real Perfect Contrast Visual Secret Sharing Schemes with Reversing. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Visual secret sharing scheme, ideal contrast, secret sharing scheme
95Wenping Ma 0002, Fu Tai Zhang New Methods to Construct Cheating Immune Multisecret Sharing Scheme. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Quadratic Function, Cheating Immune Function, Multisecret Secret Sharing, Secret Sharing
94László Csirmaz The Size of a Share Must Be Large. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF polymatroid structures, Secret sharing, ideal secret sharing schemes, perfect security
93Josef Pieprzyk, Xian-Mo Zhang Cheating Prevention in Secret Sharing over GF(pt). Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Nonlinear Secret Sharing, Cheating Immunity, Secret Sharing
88Amos Beimel, Tamir Tassa, Enav Weinreb Characterizing Ideal Weighted Threshold Secret Sharing. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
87Shlomi Dolev, Limor Lahiani, Moti Yung Secret Swarm UnitReactive k-Secret Sharing. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF mobile computing, secret sharing
87Brian King Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Linear secret sharing, Randomness requirements, Threshold secret sharing
86Brian King A Comment on Group Independent Threshold Sharing. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF integer span programs, group independent threshold schemes, black-box sharing, secret sharing, threshold cryptography, monotone span programs
84Josef Pieprzyk, Xian-Mo Zhang Cheating Prevention in Linear Secret Sharing. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Linear Secret Sharing Schemes, Cheating Identification, Cryptography, Secret Sharing, Cheating Detection
84Lein Harn, Changlu Lin Detection and identification of cheaters in ( t , n ) secret sharing scheme. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 94A62
83Shaik Maleka, Amjed Shareef, C. Pandu Rangan Rational Secret Sharing with Repeated Games. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distributed computing, game theory, Secret sharing, repeated games
83Sergio Cabello, Carles Padró, Germán Sáez Secret Sharing Schemes with Detection of Cheaters for a General Access Structure. Search on Bibsonomy FCT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Detection of cheaters, Robust and secure schemes, Cryptography, Secret sharing schemes
82Yi-Chun Wang, Justie Su-tzu Juan Simple Multi-Secret Sharing Schemes to Achieve the Optimal Maximum Improvement Ratio. Search on Bibsonomy SUTC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
82Ernest F. Brickell Some Ideal Secret Sharing Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
80Benny Chor, Eyal Kushilevitz Secret Sharing Over Infinite Domains (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
79Jaume Martí-Farré, Carles Padró On Secret Sharing Schemes, Matroids and Polymatroids. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Ideal access structures, Secret sharing, Matroids, Ideal secret sharing schemes, Information rate, Polymatroids
79Brian King Requirements for Group Independent Linear Threshold Secret Sharing Schemes. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF linear secret sharing, group independent linear threshold schemes, monotone span programs and bounds on share size, secret sharing, threshold cryptography
79Renato M. Capocelli, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro On the Size of Shares for Secret Sharing Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
78Vanesa Daza, Josep Domingo-Ferrer On Partial Anonymity in Secret Sharing. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Privacy, Protocols, Secret sharing
78Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini Secret Sharing in Multilevel and Compartmented Groups. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Hierarchical and Compartmented Access Structures, Ideal Schemes, Secret Sharing, Perfect Security
76Hui-Xian Li, Liao-Jun Pang, Wan-Dong Cai An Efficient Threshold Multi-group-Secret Sharing Scheme. Search on Bibsonomy ICFIE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Multi-group-secret sharing, Chinese Remain Theorem, Secret sharing, Threshold
76Hiroki Koga, Etsuyo Ueda Basic Properties of the (t, n)-Threshold Visual Secret Sharing Scheme with Perfect Reconstruction of Black Pixels. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Secret sharing, Visual cryptography, Threshold scheme, Visual secret sharing
76Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe Mutually Trusted Authority-Free Secret Sharing Schemes. Search on Bibsonomy J. Cryptol. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Key words, Secret sharing schemes, Secret sharing schemes
76Vinod Vaikuntanathan, Arvind Narayanan, K. Srinathan, C. Pandu Rangan, Kwangjo Kim On the Power of Computational Secret Sharing. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF computationally bounded players, monotone P, Secret sharing, access structures
75Carlo Blundo, Alfredo De Santis, Roberto de Simone, Ugo Vaccaro Tight Bounds on the Information Rate of Secret Sharing Schemes. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Information Rate and Cryptography, Entropy, Secret Sharing, Data Security
73Ilker Nadi Bozkurt, Kamer Kaya, Ali Aydin Selçuk Practical Threshold Signatures with Linear Secret Sharing Schemes. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Linear secret sharing, function sharing, threshold cryptography
73Stefan Droste New Results on Visual Cryptography. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Secret Sharing Problem, Secret Sharing Scheme, Visual Cryptography
72Huaxiong Wang, Duncan S. Wong On Secret Reconstruction in Secret Sharing Schemes. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
72Hao Chen, San Ling, Chaoping Xing Access Structures of Elliptic Secret Sharing Schemes. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
72Yvo Desmedt, Kaoru Kurosawa, Tri Van Le Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
71Tamir Tassa Hierarchical Threshold Secret Sharing. Search on Bibsonomy J. Cryptol. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
71Josh Cohen Benaloh, Jerry Leichter Generalized Secret Sharing and Monotone Functions. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
71Kamer Kaya, Ali Aydin Selçuk A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF joint random secret sharing, Asmuth-Bloom secret sharing scheme, Chinese Remainder Theorem, Verifiability
71Jovan Dj. Golic On Matroid Characterization of Ideal Secret Sharing Schemes. Search on Bibsonomy J. Cryptol. The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Matroids, Matroids, Key words, Ideal secret sharing schemes, Ideal secret sharing schemes, Access structures, Access structures
71Hugo Krawczyk Secret Sharing Made Short. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
70Ching-Nung Yang, Tse-Shih Chen An Image Secret Sharing Scheme with the Capability of Previvewing the Secret Image. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
69Amos Beimel, Matthew K. Franklin Weakly-Private Secret Sharing Schemes. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
68Lein Harn, Hung-Yu Lin An l-Span Generalized Secret Sharing Scheme. Search on Bibsonomy CRYPTO The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
67Shoulun Long, Josef Pieprzyk, Huaxiong Wang, Duncan S. Wong Generalised Cumulative Arrays in Secret Sharing. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cumulative array, Perfect hash family, Secret sharing
67Siaw-Lynn Ng A Representation of a Family of Secret Sharing Matroids. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF projective geometry, matroids, ideal secret sharing schemes
67Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl Asynchronous verifiable secret sharing and proactive cryptosystems. Search on Bibsonomy CCS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF model, secret sharing, asynchronous, proactive
67Hong-Hao Chen, Cheng-Chi Lee, Chih-Chiang Lee, Hsien-Chu Wu, Chwei-Shyong Tsai Multi-level visual secret sharing scheme with smooth-looking. Search on Bibsonomy ICIS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF code book, non-pixel expansion shares, visual cryptography, visual secret sharing
66Amos Beimel, Noam Livne, Carles Padró Matroids Can Be Far from Ideal Secret Sharing. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
66Ronald Cramer, Serge Fehr Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
66Chin-Chen Chang 0001, Jun-Chou Chuang, Pei-Yu Lin Sharing a Secret Two-Tone Image in Two Gray-Level Images. Search on Bibsonomy ICPADS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF data encryption, visual cryptography, image hiding, Visual secret sharing
66Wei Chen, Xiang Long, Yuebin Bai, Xiaopeng Gao A New Dynamic Threshold Secret Sharing Scheme from Bilinear Maps. Search on Bibsonomy ICPP Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
65Michael Beiter Combiner Driven Management Models and Their Applications. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multi-time secret sharing, threshold schemes with update capabilities, secret sharing, management models
64Christophe Tartary, Josef Pieprzyk, Huaxiong Wang Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Threshold Access Structures, Share Verifiability, Keyed One-Way Functions, Chinese Remainder Theorem, Secret Sharing Scheme
64Josh Cohen Benaloh Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
63Justie Su-tzu Juan, Chia-Li Huang Efficient Secret Sharing Schemes from Room Square. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
63Tamir Tassa Hierarchical Threshold Secret Sharing. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
62Maged Hamada Ibrahim Verifiable Threshold Sharing of a Large Secret Safe-Prime. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Robust Threshold Signature Schemes, Multi-Prime RSA, RSA Function Sharing, Threshold Cryptography, VSS
62Huawang Qin, Yuewei Dai, Zhiquan Wang A secret sharing scheme based on (t, n) threshold and adversary structure. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Adversary structure, Cryptography, Information security, Secret sharing, Threshold
62Jong-Phil Yang, Kyung Hyune Rhee, Kouichi Sakurai A Proactive Secret Sharing for Server Assisted Threshold Signatures. Search on Bibsonomy HPCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Fault tolerant and Distributed Computing, Secret sharing
61Satoshi Obana, Toshinori Araki Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
61Arun Subbiah, Douglas M. Blough An approach for fault tolerant and secure data storage in collaborative work environments. Search on Bibsonomy StorageSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF replication, secret sharing, confidentiality, collaborative environments, Byzantine fault tolerance, distributed data storage
61Liaojun Pang, Huixian Li, Ye Yao, Yumin Wang A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
60Carlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro Secret Sharing Schemes with Veto Capabilities. Search on Bibsonomy Algebraic Coding The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
60Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe On Sharing Many Secrets (Extended Abstract). Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
59Tamir Tassa, Nira Dyn Multipartite Secret Sharing by Bivariate Interpolation. Search on Bibsonomy J. Cryptol. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Multipartite access structures, Compartmented access structures, Hierarchical threshold access structures, Secret sharing, Bivariate interpolation, Monotone span programs
59Rida A. Bazzi, Goran Konjevod Efficient Verification for Provably Secure Storage and Secret Sharing in Systems Where Half the Servers Are Faulty. Search on Bibsonomy DISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF secret sharing, Byzantine failures, Secure storage
59Giovanni Di Crescenzo, Clemente Galdi Hypergraph Decomposition and Secret Sharing. Search on Bibsonomy ISAAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Hypergraph Decomposition, Algorithms, Cryptography, Secret Sharing
58Noam Kogan, Tamir Tassa Improved efficiency for revocation schemes via Newton interpolation. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Newton interpolation, secret sharing, broadcast encryption, User revocation
58Amos Beimel, Noam Livne On Matroids and Nonideal Secret Sharing. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
58Jia Yu 0003, Fanyu Kong, Rong Hao, Xuliang Li 0001 How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF digital signature, forward security, bilinear maps, Computation Diffie-Hellman problem
58Amos Beimel, Noam Livne On Matroids and Non-ideal Secret Sharing. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
57Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
56Avishek Adhikari, Tridib Kumar Dutta, Bimal K. Roy A New Black and White Visual Cryptographic Scheme for General Access Structures. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF visual secret sharing scheme, visual threshold scheme, general access structure, secret sharing scheme, visual cryptography
56Ueli M. Maurer Secure Multi-party Computation Made Simple. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF adversary structures, secret-sharing, Secure multi-party computation, verifiable secret-sharing
56Tiancheng Lou, Christophe Tartary Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Threshold Changeability, Security Rate, Dealer Free Update, Chinese Remainder Theorem, Secret Sharing Scheme, Information Rate
56Gonzalo Álvarez Marañón, Luis Hernández Encinas, Ángel Martín del Rey A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata. Search on Bibsonomy IbPRIA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Image processing, Cryptography, Cellular automata, Secret sharing
56Joseph Y. Halpern, Vanessa Teague Rational secret sharing and multiparty computation: extended abstract. Search on Bibsonomy STOC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF iterated deletion of weakly dominated strategies, non-cooperative computing, game theory, secret sharing, multiparty computation
55Xian-Mo Zhang, Josef Pieprzyk Cheating Immune Secret Sharing. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
55Thomas Beth, Hans-Joachim Knobloch, Marcus Otten Verifiable Secret Sharing for Monotone Access Structures. Search on Bibsonomy CCS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
55Chuangui Ma, Rui Cheng Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hierarchical secret sharing, ad-hoc network, key management, verifiable secret sharing
53Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran Responsive Security for Stored Data. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF distributed storage service, Security, data integrity, replication, availability, secret sharing, confidentiality, Byzantine fault tolerance
53Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran Responsive Security for Stored Data. Search on Bibsonomy ICDCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF distributed storage service, Security, data integrity, replication, availability, secret sharing, confidentiality, Byzantine fault tolerance
53Miyuki Uno, Mikio Kano Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
53Hui-Xian Li, Chun-Tian Cheng, Liao-Jun Pang A New (t, n)-Threshold Multi-secret Sharing Scheme. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
53Ernest F. Brickell, Daniel M. Davenport On the Classification of Idea Secret Sharing Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
52Kai Wang, Xukai Zou, Yan Sui A Multiple Secret Sharing Scheme based on Matrix Projection. Search on Bibsonomy COMPSAC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
52Ching-Nung Yang, Tse-Shih Chen New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square Block-Wise Operation. Search on Bibsonomy ICIAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
52Yvo Desmedt, Brian King, Berry Schoenmakers Revisiting the Karnin, Greene and Hellman Bounds. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
51Li Bai Generalized Access Structure Congestion System. Search on Bibsonomy IEEE Trans. Reliab. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
51Barbara Masucci Sharing Multiple Secrets: Models, Schemes and Analysis. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 62B10, AMS Classification 94A62
51Li Zhang 0066, Ping-Ping Zhou, Gong-bin Qian, Zhen Ji A DWT Blind Image Watermarking Strategy with Secret Sharing. Search on Bibsonomy PCM The full citation details ... 2007 DBLP  DOI  BibTeX  RDF blind image watermarking, secret sharing, closed loop, Stirmark
51Tamir Tassa, Nira Dyn Multipartite Secret Sharing by Bivariate Interpolation. Search on Bibsonomy ICALP (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF multipartite access structures, compartmented access structures, hierarchical threshold access structures, Secret sharing, bivariate interpolation, monotone span programs
51Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model. Search on Bibsonomy ACNS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF pre-distributed data, Verifiable secret sharing, multiparty protocols
51Mida Guillermo, Keith M. Martin, Christine M. O'Keefe Providing Anonymity in Unconditionally Secure Secret Sharing Schemes. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF cryptography, anonymity, secret sharing
Displaying result #1 - #100 of 3139 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license