The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for secret with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1968-1982 (16) 1983-1984 (17) 1985-1986 (19) 1987 (16) 1988 (18) 1989 (27) 1990 (21) 1991 (27) 1992 (26) 1993 (36) 1994 (42) 1995 (35) 1996 (49) 1997 (59) 1998 (70) 1999 (81) 2000 (98) 2001 (122) 2002 (174) 2003 (194) 2004 (312) 2005 (434) 2006 (458) 2007 (429) 2008 (506) 2009 (390) 2010 (243) 2011 (236) 2012 (248) 2013 (257) 2014 (312) 2015 (314) 2016 (321) 2017 (330) 2018 (370) 2019 (417) 2020 (390) 2021 (379) 2022 (371) 2023 (386) 2024 (96)
Publication types (Num. hits)
article(3585) book(5) data(1) incollection(39) inproceedings(4669) phdthesis(45) proceedings(2)
Venues (Conferences, Journals, ...)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 3563 occurrences of 1284 keywords

Results
Found 8349 publication records. Showing 8346 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
26Wen Tao Zhu General Weakness in Certain Broadcast Encryption Protocols Employing the Remainder Approach. Search on Bibsonomy ICC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Hung-Min Sun, Chi-Yao Weng, Shiuh-Jeng Wang Histogram-based undetectable fidelity image in steganography as MSB controller. Search on Bibsonomy ICUIMC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF LSB matching, LSB substitution, MSB controller, histogram detection
26Aslan Askarov, Sebastian Hunt, Andrei Sabelfeld, David Sands 0001 Termination-Insensitive Noninterference Leaks More Than Just a Bit. Search on Bibsonomy ESORICS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Pierre-Alain Fouque, Denis Réal, Frédéric Valette, M'hamed Drissi The Carry Leakage on the Randomized Exponent Countermeasure. Search on Bibsonomy CHES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Melda Yuksel, Elza Erkip Diversity-multiplexing tradeoff for the multiple-antenna wire-tap channel. Search on Bibsonomy CISS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
26Ruben Wolf, Markus Schneider 0002 A note on the security of code memo. Search on Bibsonomy Mobility Conference The full citation details ... 2007 DBLP  DOI  BibTeX  RDF mobile applications, security analysis, password management
26Feng Li, Jianwei Shang, Daxing Li A Proactive Secure Multisecret Sharing Threshold Scheme. Search on Bibsonomy SNPD (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multisecret sharing, discrete logarithm problem, threshold scheme, proactive security
26Chi-Shiang Chan, Chin-Chen Chang 0001 A Color Image Hiding Scheme Based on SMVQ and Modulo Operator. Search on Bibsonomy MMM (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF image differencing, color palette, Data hiding, image hiding
26Ching Yu Ng, Willy Susilo, Yi Mu 0001 Designated group credentials. Search on Bibsonomy AsiaCCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF designated, signature, bilinear pairings, credential
26Zhide Chen, Li Xu 0002 Anti-Collusion Anonymous Credentials Scheme. Search on Bibsonomy CIT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Stefan Böttcher, Rita Steinmetz Information Disclosure by XPath Queries. Search on Bibsonomy Secure Data Management The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Hao Li, Peishun Liu An Identification System Combined with Fingerprint and Cryptography. Search on Bibsonomy IMSCCS (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Chin-Chen Chang 0001, Yung-Chen Chou Quantization Index Modulation Using Vector Quantization with DWT Based State-Codebook Search. Search on Bibsonomy IIH-MSP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Yaqin Zhao, Nan Zhao, Guanghui Ren, Bo Zhang A Novel Large Capacity Image Hiding Method Based on the Orthogonal Chaotic Sequences. Search on Bibsonomy IIH-MSP The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
26Tao Zhang 0037, Xiaotong Zhuang, Santosh Pande Building Intrusion-Tolerant Secure Software. Search on Bibsonomy CGO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Itsik Mantin A Practical Attack on the Fixed RC4 in the WEP Mode. Search on Bibsonomy ASIACRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Related IV attacks, Cryptanalysis, Stream ciphers, Side-channel attacks, Fault analysis, RC4, Related key attacks
26Yuseung Sohn, Misung Cho, Giwon On, Kijoon Chae A Secure User Authentication Method in Networked Intelligent Manufacturing Systems. Search on Bibsonomy CW The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Amos Beimel, Enav Weinreb Monotone Circuits for Weighted Threshold Functions. Search on Bibsonomy CCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
26Chong Hee Kim, Yong Ho Hwang, Pil Joong Lee Practical Pay-TV Scheme Using Traitor Tracing Scheme for Multiple Channels. Search on Bibsonomy WISA The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
26Amos Beimel, Enav Weinreb Separating the Power of Monotone Span Programs over Different Fields. Search on Bibsonomy FOCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
26Yan Zong Ding, Michael O. Rabin Hyper-Encryption and Everlasting Security. Search on Bibsonomy STACS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
26Amos Beimel, Yuval Ishai On the Power of Nonlinear Secrect-Sharing. Search on Bibsonomy CCC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
26Annalisa De Bonis, Alfredo De Santis Randomness in Visual Cryptography. Search on Bibsonomy STACS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
26Louis Salvail The Search for the Holy Grail in Quantum Cryptography. Search on Bibsonomy Lectures on Data Security The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
26Chae Hoon Lim, Pil Joong Lee A Key Recovery Attack on Discrete Log-based Schemes Using a Prime Order Subgroupp. Search on Bibsonomy CRYPTO The full citation details ... 1997 DBLP  DOI  BibTeX  RDF
26Tatsuaki Okamoto, Kazuo Ohta How to Simultaneously Exchange Secrets by General Assumptions. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
26Carlo Blundo, Alfredo De Santis, Ugo Vaccaro Efficient Sharing of Many Secrets. Search on Bibsonomy STACS The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
26Kazuo Ohta, Tatsuaki Okamoto, Kenji Koyama Membership Authentication for Hierarchical Multigroups Using the Extended Fiat-Shamir Scheme. Search on Bibsonomy EUROCRYPT The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
26Russell Impagliazzo, Steven Rudich Limits on the Provable Consequences of One-way Permutations. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
25Jaume Martí-Farré, Carles Padró Ideal secret sharing schemes whose minimal qualified subsets have at most three participants. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 94A62, 05B35
25Changlu Lin, Lein Harn, Dingfeng Ye Ideal Perfect Multilevel Threshold Secret Sharing Scheme. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Alessandro Sorniotti, Refik Molva A Provably Secure Secret Handshake with Dynamic Controlled Matching. Search on Bibsonomy SEC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Amos Beimel, Ilan Orlov Secret Sharing and Non-Shannon Information Inequalities. Search on Bibsonomy TCC The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
25Alexandre Berzati, Cécile Canovas-Dumas, Louis Goubin Fault Analysis of Rabbit: Toward a Secret Key Leakage. Search on Bibsonomy INDOCRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF carry analysis, Stream cipher, fault attacks, Rabbit
25Shyong Jian Shyu, Ying-Ru Chen Threshold Secret Image Sharing by Chinese Remainder Theorem. Search on Bibsonomy APSCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Ronald Cramer, Yevgeniy Dodis, Serge Fehr, Carles Padró, Daniel Wichs Detection of Algebraic Manipulation with Applications to Robust Secret Sharing and Fuzzy Extractors. Search on Bibsonomy EUROCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Haibo Zhang, Xiaofei Wang, Youpeng Huang A Novel Encoding Method for Ideal Contrast Visual Secret Sharing Schemes with Reversing. Search on Bibsonomy CSSE (5) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Chin-Chen Chang 0001, Chin-Feng Lee, Yi-Ren Wang An Improved EMD Embedding Scheme Based on Secret Image Difference. Search on Bibsonomy EUC (1) The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
25Ee-Chien Chang, Sujoy Roy Robust Extraction of Secret Bits from Minutiae. Search on Bibsonomy ICB The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Locality preserving hash, Cryptography, Fuzzy vault, Secure sketch
25Runhua Shi, Hong Zhong 0001, Liusheng Huang A (t, n)-threshold verified multi-secret sharing scheme based on ECDLP. Search on Bibsonomy SNPD (2) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
25Ching-Nung Yang, Tse-Shih Chen Visual Secret Sharing Scheme: Improving the Contrast of a Recovered Image Via Different Pixel Expansions. Search on Bibsonomy ICIAR (1) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
25Daihyun Lim, Jae W. Lee, Blaise Gassend, G. Edward Suh, Marten van Dijk, Srinivas Devadas Extracting secret keys from integrated circuits. Search on Bibsonomy IEEE Trans. Very Large Scale Integr. Syst. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25David Dagon, Wenke Lee, Richard J. Lipton Protecting Secret Data from Insider Attacks. Search on Bibsonomy Financial Cryptography The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Ryouichi Nishimura, Norihiro Fujita, Yôiti Suzuki Audio Secret Sharing for 1-Bit Audio. Search on Bibsonomy KES (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Claude Crépeau, Daniel Gottesman, Adam D. Smith Approximate Quantum Error-Correcting Codes and Secret Sharing Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Thomas Holenstein, Renato Renner One-Way Secret-Key Agreement and Applications to Circuit Polarization and Immunization of Public-Key Encryption. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Ronald Cramer, Vanesa Daza, Ignacio Gracia, Jorge Jiménez Urroz, Gregor Leander, Jaume Martí-Farré, Carles Padró On Codes, Matroids and Secure Multi-party Computation from Linear Secret Sharing Schemes. Search on Bibsonomy CRYPTO The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Shaohua Tang Simple Threshold RSA Signature Scheme Based on Simple Secret Sharing. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
25Hala A. Farouk, Magdy Saeb Design and Implementation of a Secret Key Steganographic Micro-Architecture Employing FPGA. Search on Bibsonomy DATE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF FPGA, architecture, Steganography, data hiding, subliminal channel, covert communications
25Hala A. Farouk, Magdy Saeb Design and implementation of a secret key steganographic micro-architecture employing FPGA. Search on Bibsonomy ASP-DAC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Pradeep K. Atrey, Wei-Qi Yan 0001, Ee-Chien Chang, Mohan S. Kankanhalli A Hierarchical Signature Scheme for Robust Video Authentication using Secret Sharing. Search on Bibsonomy MMM The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
25Jessica J. Fridrich, Miroslav Goljan, Dorin Hogea, David Soukal Quantitative steganalysis of digital images: estimating the secret message length. Search on Bibsonomy Multim. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Covert, Steganography, Attacks, Capacity, Steganalysis
25Franciszek Seredynski, Pascal Bouvry, Albert Y. Zomaya Secret Key Cryptography with Cellular Automata. Search on Bibsonomy IPDPS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Dirk Balfanz, Glenn Durfee, Narendar Shankar, Diana K. Smetters, Jessica Staddon, Hao-Chi Wong Secret Handshakes from Pairing-Based Key Agreements. Search on Bibsonomy S&P The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
25Alin Dobra, Johannes Gehrke SECRET: a scalable linear regression tree algorithm. Search on Bibsonomy KDD The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
25Rosario Gennaro, Yuval Ishai, Eyal Kushilevitz, Tal Rabin The round complexity of verifiable secret sharing and secure multicast. Search on Bibsonomy STOC The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
25Glenn Durfee, Phong Q. Nguyen Cryptanalysis of the RSA Schemes with Short Secret Exponent from Asiacrypt '99. Search on Bibsonomy ASIACRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
25Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki Dealing Necessary and Sufficient Numbers of Cards for Sharing a One-Bit Secret Key. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
25Eiichiro Fujisaki, Tatsuaki Okamoto A Practical and Provably Secure Scheme for Publicly Verifiable Secret Sharing and Its Applications. Search on Bibsonomy EUROCRYPT The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
25Wenbo Mao Necessity and Realization of Universally Verifiable Secret Sharing. Search on Bibsonomy S&P The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
25Kazukuni Kobara, Hideki Imai Limiting the Visible Space Visual Secret Sharing Schemes and Their Application to Human Identification. Search on Bibsonomy ASIACRYPT The full citation details ... 1996 DBLP  DOI  BibTeX  RDF
25Noga Alon, Zvi Galil, Moti Yung Efficient Dynamic-Resharing "Verifiable Secret Sharing" Against Mobile Adversary. Search on Bibsonomy ESA The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
25Stefan Brands Restrictive Blinding of Secret-Key Certificates. Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
25Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe Efficient Secret Sharing Without a Mutually Trusted Authority (Extended Abstract). Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
25Rosario Gennaro, Silvio Micali Verifiable Secret Sharing as Secure Computation. Search on Bibsonomy EUROCRYPT The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
25Marten van Dijk A Linear Construction of Perfect Secret Sharing Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
25Gilles Brassard, Louis Salvail Secret-Key Reconciliation by Public Discussion. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
25Kaoru Kurosawa, Koji Okada, Keiichi Sakano, Wakaha Ogata, Shigeo Tsujii Nonperfect Secret Sharing Schemes and Matroids. Search on Bibsonomy EUROCRYPT The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
25Ueli M. Maurer Protocols for Secret Key Agreement by Public Discussion Based on Common Information. Search on Bibsonomy CRYPTO The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
25Hung-Yu Lin, Lein Harn A Generalized Secret Sharing Scheme With Cheater Detection. Search on Bibsonomy ASIACRYPT The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
25Ernest F. Brickell, Douglas R. Stinson Some Improved Bounds on the Information Rate of Perfect Secret Sharing Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1990 DBLP  DOI  BibTeX  RDF
24Ran-Zan Wang, Yung-Yi Lin, Shang-Kuan Chen, Yeuan-Kuen Lee, Shih-Yu Huang, Shyong Jian Shyu Multisecret Image Sharing. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secret sharing, sharing, secret image sharing
24Dominik Engel, Rade Kutil, Andreas Uhl A symbolic transform attack on lightweight encryption based on wavelet filter parameterization. Search on Bibsonomy MM&Sec The full citation details ... 2006 DBLP  DOI  BibTeX  RDF ciphertext-only, known-plaintext, secret frequency domain, secret parameterized wavelet filters, attack, JPEG2000
23R. Aparna, B. B. Amberker Authenticated Secure Group Communication using Broadcast Encryption Key Computation. Search on Bibsonomy ITNG The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Authentication, Threshold, Broadcast encryption, Secure Group Communication, Secret key
23Manuel Barbosa, Pooya Farshim Secure Cryptographic Workflow in the Standard Model. Search on Bibsonomy INDOCRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cryptographic Workflow, Key Encapsulation, Secret Sharing, Identity-Based Encryption
23Sherman S. M. Chow, Zhengjun Cao, Joseph K. Liu Security Analysis of Three Cryptographic Schemes from Other Cryptographic Schemes. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF secret sharing, bilinear pairings, Group signature, signcryption, proxy signature, identity-based signature
23Jianhua Ma 0002, Akito Nakamura, Runhe Huang A Random ID Update Scheme to Protect Location Privacy in RFID-Based Student Administration Systems. Search on Bibsonomy DEXA Workshops The full citation details ... 2005 DBLP  DOI  BibTeX  RDF secret ID, hash circuit, traceability, location privacy, RFID tag, reader
23Adam Wierzbicki, Tomasz Kucharski P2P Scrabble. Can P2P Games Commence? Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2004 DBLP  DOI  BibTeX  RDF peer-to-peer, distributed hash tables, secret sharing, trust management, commitment protocols
23Shengli Liu 0001, Henk C. A. van Tilborg, Marten van Dijk A Practical Protocol for Advantage Distillation and Information Reconciliation. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF advantage distillation, unconditional security, secret key agreement, information reconciliation
23Guofei Gu, Bin B. Zhu, Shipeng Li 0001, Shiyong Zhang PLI: A New Framework to Protect Digital Content for P2P Networks. Search on Bibsonomy ACNS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF digital content protection, Public License Infrastructure (PLI), License Authority (LA), proactive shares update, distributed trust model, secret sharing, intrusion tolerance, Peer-to-Peer (P2P), Digital Rights Management (DRM)
23Wen Ping Ma, Moon Ho Lee Group Oriented Cryptosystems Based on Linear Access Structures. Search on Bibsonomy ICISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Group Oriented Cryptosystem, ElGamal Cryptosystem, Vector Space Access Structure, Cryptography, Secret Sharing
23Takaaki Mizuki, Hiroki Shizuya, Takao Nishizeki A complete characterization of a family of key exchange protocols. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Key exchange graph, Key set protocol, Secret key exchange, Information-theoretically secure, Card game
23Joachim Biskup, Piero A. Bonatti Controlled Query Evaluation for Known Policies by Combining Lying and Refusal. Search on Bibsonomy FoIKS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Potential secret, Reliability, Inference control, Secrecy, User log, Lying, Refusal, Controlled query evaluation
23Joachim Biskup, Ulrich Flegel Transaction-Based Pseudonyms in Audit Data for Privacy Respecting Intrusion Detection. Search on Bibsonomy Recent Advances in Intrusion Detection The full citation details ... 2000 DBLP  DOI  BibTeX  RDF audit analysis, purpose binding, privacy, intrusion detection, anonymity, secret sharing, pseudonymity
23Stuart E. Schechter, Todd Parnell, Alexander J. Hartemink Anonymous Authentication of Membership in Dynamic Groups. Search on Bibsonomy Financial Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF key replacement, verifiably common secret encoding, authentication, anonymity, identification
23Douglas R. Stinson, Ruizhong Wei Key Preassigned Traceability Schemes for Broadcast Encryption. Search on Bibsonomy Selected Areas in Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF key preassigned scheme, traceability, broadcast encryption, secret sharing schemes, combinatorial designs
23Feng Bao 0004, Yutaka Funyu, Yukihiro Hamada, Yoshihide Igarashi Reliable broadcasting and secure distributing in channel networks. Search on Bibsonomy ISPAN The full citation details ... 1997 DBLP  DOI  BibTeX  RDF channel networks, secure message distributing, message distribution schemes, secret sharing, spanning trees, security of data, reliable broadcasting, fault-tolerant communication
23Chih-Hung Wang, Tzonelih Hwang Threshold and Generalized DSS Signatures without a Trusted Party. Search on Bibsonomy ACSAC The full citation details ... 1997 DBLP  DOI  BibTeX  RDF (t+1,n) threshold signature scheme, generalized DSS signatures, trusted party, secret key sharing, valid group signature, Digital Signature Standard, signers, conspiracy, signing procedure, cryptography
21Pei-Yu Lin, Chi-Shiang Chan A Verifiable and Recoverable Secret Image Sharing Mechanism. Search on Bibsonomy ISPA The full citation details ... 2011 DBLP  DOI  BibTeX  RDF camouflage, magic matrix, secret sharing, reversible, verifiable
21Jen-Ho Yang, Chin-Chen Chang 0001, Chih-Hung Wang An Efficient V-Fairness (t, n) Threshold Secret Sharing Scheme. Search on Bibsonomy ICGEC The full citation details ... 2011 DBLP  DOI  BibTeX  RDF cheater detectio, Lagrange interpolation method, Secret sharing
21Lein Harn, Changlu Lin Authenticated Group Key Transfer Protocol Based on Secret Sharing. Search on Bibsonomy IEEE Trans. Computers The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Group key transfer protocol, authentication, secret sharing, confidentiality, session key
21Cai Biao, Zhishu Li, Zhen Luo Threshold Secret Sharing Based Trust Security in Structured P2P Network. Search on Bibsonomy IITSI The full citation details ... 2010 DBLP  DOI  BibTeX  RDF trust security, structured trust topology, P2P network, threshold secret sharing
21Qiongxiao Wang, Jiwu Jing, Jingqiang Lin A Secure Storage System Combining Secret Sharing Schemes and Byzantine Quorum Mechanisms. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Byzantine quorum systems, Byzantine fault tolerance, Secret sharing schemes
21Feng Shen, Chonglei Mei, Hai Jiang 0003, Zhiqian Xu 0001 Towards Secure and Reliable Data Storage with Multi-coefficient Secret Sharing. Search on Bibsonomy CIT The full citation details ... 2010 DBLP  DOI  BibTeX  RDF Secret sharing, data storage, coefficient
21Yiding Wang, Xiaojing Wang, Dan Tang Secret Image Sharing Based on Array Codes. Search on Bibsonomy APWCS The full citation details ... 2010 DBLP  DOI  BibTeX  RDF array codes, Finite fields, Digital images, secret sharing scheme
21Wen-Pinn Fang Parallel Processing for Secret Image Sharing. Search on Bibsonomy ISPA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF open mpi, security, parallel processing, style, secret image sharing
21Xiujie Zhang, Mingxing He Collusion Attack Resistance and Practice-Oriented Threshold Changeable Secret Sharing Schemes. Search on Bibsonomy AINA The full citation details ... 2010 DBLP  DOI  BibTeX  RDF threshold changeable secret sharing scheme, partial broadcast
21Wen-Pinn Fang Multi-layer Secret Image Sharing. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF fault-tolerance, management, secret sharing, share, multi-layer
21Lin Dong, Min Ku Novel (n, n) Secret Image Sharing Scheme Based on Addition. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF complexity, matrix, addition, contrast, secret image sharing
21Yung-Chen Chou, Chih-Hung Lin, Pao-Ching Li, Yu-Chiang Li A (2, 3) Threshold Secret Sharing Scheme Using Sudoku. Search on Bibsonomy IIH-MSP The full citation details ... 2010 DBLP  DOI  BibTeX  RDF steganography, secret sharing, Data hiding, Sudoku
Displaying result #301 - #400 of 8346 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license