The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase secret-sharing (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1983-1989 (15) 1990-1992 (28) 1993-1994 (33) 1995 (16) 1996 (24) 1997 (21) 1998 (22) 1999 (28) 2000 (27) 2001 (27) 2002 (51) 2003 (57) 2004 (59) 2005 (110) 2006 (108) 2007 (87) 2008 (127) 2009 (110) 2010 (97) 2011 (126) 2012 (119) 2013 (132) 2014 (148) 2015 (152) 2016 (140) 2017 (133) 2018 (172) 2019 (199) 2020 (205) 2021 (193) 2022 (150) 2023 (177) 2024 (46)
Publication types (Num. hits)
article(1705) book(3) incollection(16) inproceedings(1398) phdthesis(17)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 756 occurrences of 312 keywords

Results
Found 3139 publication records. Showing 3139 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
20Hossein Ghodosi, Josef Pieprzyk Multi-Party Computation with Omnipresent Adversary. Search on Bibsonomy Public Key Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Omnipresent Adversary, Proactive Secret Sharing, t-resilient Protocols, t-private Protocols, Multi-Party Computation
20J. A. M. Naranjo, Juan Antonio López-Ramos, Leocadio G. Casado Key Management Schemes for Peer-to-Peer Multimedia Streaming Overlay Networks. Search on Bibsonomy WISTP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF peer-to-peer networks, secret sharing, digital rights management, key distribution, Conditional access
20Chin-Feng Lee, Chin-Chen Chang 0001, Tien-Chung Liu A VSS Scheme of Image Size Invariant for Vertical Edge Enhancement. Search on Bibsonomy HIS (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF visual cryptography scheme, shadows, visual secret sharing
20Brian Thompson, Stuart Haber, William G. Horne, Tomas Sander, Danfeng Yao Privacy-Preserving Computation and Verification of Aggregate Queries on Outsourced Databases. Search on Bibsonomy Privacy Enhancing Technologies The full citation details ... 2009 DBLP  DOI  BibTeX  RDF privacy, verification, integrity, secret sharing, outsource, Aggregate query
20Tomas Toft Constant-Rounds, Almost-Linear Bit-Decomposition of Secret Shared Values. Search on Bibsonomy CT-RSA The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Constant-rounds Multi-party Computation, Bit-decomposition, Secret Sharing
20The Duc Kieu, Chin-Chen Chang 0001, Zhi-Hui Wang 0001, Mingchu Li Sharing Secrets and Reversibly Reconstructing the Cover Image Using Two Meaningful Shadows. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secret sharing, reversible data hiding
20Ran-Zan Wang, Yung-Yi Lin, Shang-Kuan Chen, Yeuan-Kuen Lee, Shih-Yu Huang, Shyong Jian Shyu Multisecret Image Sharing. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF secret sharing, sharing, secret image sharing
20Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, Min-Shiang Hwang Reversible Secret Image Sharing Based on Shamir's Scheme. Search on Bibsonomy IIH-MSP The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Cryptography, Steganography, Secret Sharing, Reversible, Fragile Watermark, Threshold Scheme
20Shyong Jian Shyu, Chun-Chieh Chuang, Ying-Ru Chen, Ah-Fur Lai Weighted Threshold Secret Image Sharing. Search on Bibsonomy PSIVT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Weighted shadow size, Chinese remainder theorem, Threshold secret sharing, Secret image sharing
20Lukasz Chmielewski, Jaap-Henk Hoepman Fuzzy Private Matching (Extended Abstract). Search on Bibsonomy ARES The full citation details ... 2008 DBLP  DOI  BibTeX  RDF secure 2-party computation, secret sharing, fuzzy matching
20Abedelaziz Mohaisen, YoungJae Maeng, Jeonil Kang, DaeHun Nyang, KyungHee Lee, Dowon Hong, Jong Wook Han Protection Techniques of Secret Information in Non-tamper Proof Devices of Smart Home Network. Search on Bibsonomy UIC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF secret information, code attestation, security and system integration, authentication, secret sharing, home network
20Chao-Wen Chan, Chih-Hao Lin A New Credit Card Payment Scheme Using Mobile Phones Based on Visual Cryptography. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF secret sharing, key agreement, payment, visual cryptography
20Yu Fu, Tianyu Ye, Zhiguo Qu, Xinxin Niu, Yixian Yang A Novel Relational Database Watermarking Algorithm for Joint Ownership. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF watermarking sharing, relational database, secret sharing
20Chia-Chun Wu, Shang-Juh Kao, Wen-Chung Kuo, Min-Shiang Hwang Enhance the Image Sharing with Steganography and Authentication. Search on Bibsonomy IIH-MSP The full citation details ... 2008 DBLP  DOI  BibTeX  RDF (k, n)-Threshold Scheme, Cryptography, Steganography, Secret Sharing, Galois Field, Fragile Watermark
20Jessica Staddon, Philippe Golle, Martin Gagné, Paul Rasmussen A content-driven access control system. Search on Bibsonomy IDtrust The full citation details ... 2008 DBLP  DOI  BibTeX  RDF access control, secret sharing, revocation, inference control, attribute-based encryption
20Johann van der Merwe, Dawoud S. Dawoud, Stephen McDonald A Fully Distributed Proactively Secure Threshold-Multisignature Scheme. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2007 DBLP  DOI  BibTeX  RDF threshold-multisignature, distributed-key management infrastructure, publicly verifiable distributed-key generation, publicly verifiable distributed-key update, publicly verifiable distributed-key redistribution, distributed systems, secret sharing, Security and protection, group-oriented cryptography
20Takashi Nishide, Kazuo Ohta Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol. Search on Bibsonomy Public Key Cryptography The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Bitwise Sharing, Secret Sharing, Multiparty Computation
20Bob Mungamuru, Hector Garcia-Molina, Christopher Olston Configurations: a model for distributed data storage. Search on Bibsonomy PODC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF optimization, replication, implementability, encryption, taxonomy, configurations, secret sharing
20Miyuki Uno, Mikio Kano Visual Cryptography Schemes with Dihedral Group Access Structure for Many Images. Search on Bibsonomy ISPEC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF diheadral group, many secret images, visual cryptography, visual secret sharing, VSS, VCS
20Sheng Zhong 0002, Yang Richard Yang Verifiable Distributed Oblivious Transfer and Mobile Agent Security. Search on Bibsonomy Mob. Networks Appl. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF privacy, mobile agent, oblivious transfer, verifiable secret sharing
20Shang-Lin Hsieh, Hsuan-Chieh Huang, I-Ju Tsai A Copyright Protection Scheme for Gray-Level Images Using Human Fingerprint. Search on Bibsonomy ITNG The full citation details ... 2006 DBLP  DOI  BibTeX  RDF fingerprint enhancement, digital watermarking, discrete wavelet transform, copyright protection, secret sharing scheme
20Keith M. Martin, Reihaneh Safavi-Naini, Huaxiong Wang, Peter R. Wild Distributing the Encryption and Decryption of a Block Cipher. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF thereshold cryptography, block cipher, secret sharing, shared computation
20Stelvio Cimato, Roberto De Prisco, Alfredo De Santis Optimal Colored Threshold Visual Cryptography Schemes. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2005 DBLP  DOI  BibTeX  RDF visual crytography, secret sharing schemes
20Wen-Chung Kuo, Ming-Yang Chen A Modified (t, n) Threshold Proxy Signature Scheme Based on the RSA Cryptosystem. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF RSA, Secret Sharing, Proxy Signature
20Moushumi Sharmin, Shameem Ahmed, Sheikh Iqbal Ahamed SAFE-RD (Secure, Adaptive, Fault Tolerant, and Efficient Resource Discovery) inPervasive Computing Environments. Search on Bibsonomy ITCC (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Cluster based Dynamic Hash Algorithm, Modified Announcement Process, Modified Secret Sharing, Resource Discovery, Pervasive Computing Environments
20Yuanbo Guo, Jianfeng Ma 0001 An intrusion-tolerant authorization and authentication scheme in distributed environments. Search on Bibsonomy ACM SIGOPS Oper. Syst. Rev. The full citation details ... 2004 DBLP  DOI  BibTeX  RDF authorization and authentication, intrusion-tolerant, verifiable secret sharing
20Robert W. Bradshaw, Jason E. Holt, Kent E. Seamons Concealing complex policies with hidden credentials. Search on Bibsonomy CCS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF privacy, authentication, secret sharing, identity based encryption, credentials, trust negotiation
20Anindo Mukherjee, Hongmei Deng, Dharma P. Agrawal Distributed Pairwise Key Generation Using Shared Polynomials for Wireless Ad Hoc Networks. Search on Bibsonomy MWCN The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Bivariate Polynomials, Security, Ad Hoc Networks, Symmetric Keys, Threshold Secret Sharing
20Regine Endsuleit, Jacques Calmet Introducing Robust and Private Computation into Grid Technology. Search on Bibsonomy WETICE The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Security in the Grid, Ro-bustness, Privacy, Distributed Computation, Secret Sharing
20Adam Wierzbicki, Tomasz Kucharski P2P Scrabble. Can P2P Games Commence? Search on Bibsonomy Peer-to-Peer Computing The full citation details ... 2004 DBLP  DOI  BibTeX  RDF peer-to-peer, distributed hash tables, secret sharing, trust management, commitment protocols
20Asnat Dadon-Elichai RDS: Remote Distributed Scheme for Protecting Mobile Agents. Search on Bibsonomy AAMAS The full citation details ... 2004 DBLP  DOI  BibTeX  RDF Security, mobile agents, secret - sharing
20Christian Cachin An asynchronous protocol for distributed computation of RSA inverses and its applications. Search on Bibsonomy PODC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF verifiable random functions, Cryptography, Byzantine agreement, threshold signatures, verifiable secret sharing
20Sheng Zhong, Yang Richard Yang Verifiable distributed oblivious transfer and mobile agent security. Search on Bibsonomy DIALM-POMC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF resiliency to corruptions, secure mobile agents and mobile code, oblivious transfer, verifiable secret sharing
20Lidong Zhou, Fred B. Schneider, Robbert van Renesse COCA: A secure distributed online certification authority. Search on Bibsonomy ACM Trans. Comput. Syst. The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Byzantine quorum systems, proactive secret-sharing, denial of service, public key infrastructure, threshold cryptography, Certification authority
20Erica Y. Yang, Jie Xu 0007, Keith H. Bennett Private Information Retrieval in the Presence of Malicious Failures. Search on Bibsonomy COMPSAC The full citation details ... 2002 DBLP  DOI  BibTeX  RDF security, fault tolerance, Distributed systems, secret sharing, privacy protection, private information retrieval, malicious failures
20Chin-Chen Chang 0001, Tai-Xing Yu Sharing a Secret Gray Image in Multiple Images. Search on Bibsonomy CW The full citation details ... 2002 DBLP  DOI  BibTeX  RDF secret sharing, Visual cryptography
20Erica Y. Yang, Jie Xu 0007, Keith H. Bennett A Fault-Tolerant Approach to Secure Information Retrieval. Search on Bibsonomy SRDS The full citation details ... 2002 DBLP  DOI  BibTeX  RDF malicious faults, security, fault tolerance, secret sharing, private information retrieval, Distributed database systems
20Anna Gál A characterization of span program size and improved lower bounds for monotone span programs. Search on Bibsonomy Comput. Complex. The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Span programs, Boolean formula size, secret sharing..¶ Subject classification. 68Q15, lower bounds, 94C10
20Rosario Gennaro A Protocol to Achieve Independence in Constant Rounds. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2000 DBLP  DOI  BibTeX  RDF simultaneous broadcast and Verifiable Secret Sharing (VSS) protocols, computation model, communication networks, Independence
20Joachim Biskup, Ulrich Flegel Threshold-based identity recovery for privacy enhanced applications. Search on Bibsonomy CCS The full citation details ... 2000 DBLP  DOI  BibTeX  RDF purpose binding, privacy, anonymity, secret sharing, pseudonymity
20Jian-Zhu Lu, Huo Yan Chen Improvement of authenticated encryption scheme with (t, n) shared verification. Search on Bibsonomy COMPSAC The full citation details ... 2000 DBLP  DOI  BibTeX  RDF Factoring and discrete logarithms, Network security, Signature verification, Secret-sharing scheme, Authenticated encryption, Message recovery
20Amos Beimel, Anna Gál, Mike Paterson Lower Bounds for Monotone Span Programs. Search on Bibsonomy FOCS The full citation details ... 1995 DBLP  DOI  BibTeX  RDF linear algebraic model, span programs, symmetric branching, formula size, cryptography, lower bounds, secret-sharing, programming theory, computation theory, monotone span programs
20Mike Just, Evangelos Kranakis, Danny Krizanc, Paul C. van Oorschot On Key Distribution via True Broadcasting. Search on Bibsonomy CCS The full citation details ... 1994 DBLP  DOI  BibTeX  RDF secret sharing, key distribution, broadcast encryption
20Timothy Stevens, Joseph P. Near, Christian Skalka Secret Sharing Sharing For Highly Scalable Secure Aggregation. Search on Bibsonomy CoRR The full citation details ... 2022 DBLP  BibTeX  RDF
20Vipul Goyal, Antigoni Polychroniadou, Yifan Song Sharing Transformation and Dishonest Majority MPC with Packed Secret Sharing. Search on Bibsonomy IACR Cryptol. ePrint Arch. The full citation details ... 2022 DBLP  BibTeX  RDF
20Vipul Goyal, Antigoni Polychroniadou, Yifan Song Sharing Transformation and Dishonest Majority MPC with Packed Secret Sharing. Search on Bibsonomy CRYPTO (4) The full citation details ... 2022 DBLP  DOI  BibTeX  RDF
20Farhan Musanna, Sanjeev Kumar 0001 A novel three party Quantum secret sharing scheme based on Bell state sequential measurements with application in quantum image sharing. Search on Bibsonomy CoRR The full citation details ... 2020 DBLP  BibTeX  RDF
20Farhan Musanna, Sanjeev Kumar 0001 A novel three-party quantum secret sharing scheme based on Bell state sequential measurements with application in quantum image sharing. Search on Bibsonomy Quantum Inf. Process. The full citation details ... 2020 DBLP  DOI  BibTeX  RDF
20Shinichi Goto, Keiichi Iwamura, Yuji Suga, Kitahiro Kaneda Secret Sharing Scheme and Key Sharing Scheme Suitable for Clustered Sensor Networks. Search on Bibsonomy WINSYS The full citation details ... 2016 DBLP  DOI  BibTeX  RDF
20Yanjun Liu 0002, Lein Harn, Chin-Chen Chang 0001 A novel verifiable secret sharing mechanism using theory of numbers and a method for sharing secrets. Search on Bibsonomy Int. J. Commun. Syst. The full citation details ... 2015 DBLP  DOI  BibTeX  RDF
20V. P. Binu, A. Sreekumar Simple and Efficient Secret Sharing Schemes for Sharing Data and Image. Search on Bibsonomy CoRR The full citation details ... 2015 DBLP  BibTeX  RDF
20Guillaume Smith, Roksana Boreli, Mohamed Ali Kâafar A Layered Secret Sharing Scheme for Automated Profile Sharing in OSN Groups. Search on Bibsonomy MobiQuitous The full citation details ... 2013 DBLP  DOI  BibTeX  RDF
20Marius Wernke, Frank Dürr, Kurt Rothermel PShare: Position sharing for location privacy based on multi-secret sharing. Search on Bibsonomy PerCom The full citation details ... 2012 DBLP  DOI  BibTeX  RDF
19Jinsong Han, Yunhao Liu 0001 Mutual Anonymity for Mobile P2P Systems. Search on Bibsonomy IEEE Trans. Parallel Distributed Syst. The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
19Jinsong Han, Yunhao Liu 0001, Li Xiao 0001, Renyi Xiao, Lionel M. Ni A Mutual Anonymous Peer-to-Peer Protocol Design. Search on Bibsonomy IPDPS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
19Shangping Zhong, Xiangwen Liao, Xue Zhang, Jingqu Lin A Novel Distributed Single Sign-On Scheme with Dynamically Changed Threshold Value. Search on Bibsonomy IAS The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
19Bruce Christianson, Michael Roe, David Wheeler Secure Sessions from Weak Secrets. Search on Bibsonomy Security Protocols Workshop The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
19Yevgeniy Dodis, Amit Sahai, Adam D. Smith On Perfect and Adaptive Security in Exposure-Resilient Cryptography. Search on Bibsonomy EUROCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
19Wenbo Mao Guaranteed Correct Sharing of Integer Factorization with Off-Line Shareholders. Search on Bibsonomy Public Key Cryptography The full citation details ... 1998 DBLP  DOI  BibTeX  RDF
19Donald Beaver, Shafi Goldwasser Multiparty Computation with Faulty Majority. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
16Fei Richard Yu, Helen Tang, Fei Wang 0006, Victor C. M. Leung Distributed Node Selection for Threshold Key Management with Intrusion Detection in Mobile Ad Hoc Networks. Search on Bibsonomy CSE (2) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
16Fagen Li, Masaaki Shirase, Tsuyoshi Takagi Key Management Using Certificateless Public Key Cryptography in Ad Hoc Networks. Search on Bibsonomy NPC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Ad hoc network, network security, key management, certificateless public key cryptography
16Stanislaw Jarecki, Josh Olsen Proactive RSA with Non-interactive Signing. Search on Bibsonomy Financial Cryptography The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Bhavani Shankar, Kannan Srinathan, C. Pandu Rangan Alternative Protocols for Generalized Oblivious Transfer. Search on Bibsonomy ICDCN The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Rongxing Lu, Xiaodong Lin 0001, Haojin Zhu, Pin-Han Ho, Xuemin Shen, Zhenfu Cao A New Dynamic Group Key Management Scheme with Low Rekeying Cost. Search on Bibsonomy WCNC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Huang Lin, Zhenfu Cao, Xiaohui Liang, Jun Shao Secure Threshold Multi Authority Attribute Based Encryption without a Central Authority. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Threshold Multi Authority ABE, Without a central authority
16Yugeng Sun, Juwei Zhang, Hao Ji, Ting Yang KMSGC: A Key Management Scheme for Clustered Wireless Sensor Networks Based on Group-oriented Cryptography. Search on Bibsonomy ICNSC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Jungha Woo, Abhilasha Bhargav-Spantzel, Anna Cinzia Squicciarini, Elisa Bertino Verification of Receipts from M-commerce Transactions on NFC Cellular Phones. Search on Bibsonomy CEC/EEE The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
16Jingliang Zhang, Lizhen Ma, Yumin Wang Dynamic Fair Electronic Cash Model without Trustees. Search on Bibsonomy I3E (1) The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
16Ivan Damgård, Matthias Fitzi, Eike Kiltz, Jesper Buus Nielsen, Tomas Toft Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Michael Ben-Or, Claude Crépeau, Daniel Gottesman, Avinatan Hassidim, Adam D. Smith Secure Multiparty Quantum Computation with (Only) a Strict Honest Majority. Search on Bibsonomy FOCS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
16Germán Sáez Self-healing Key Distribution Schemes with Sponsorization. Search on Bibsonomy Communications and Multimedia Security The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16An Braeken, Ventzislav Nikov, Svetla Nikova Error-Set Codes and Related Objects. Search on Bibsonomy COCOON The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
16Ren-Junn Hwang, Chin-Chen Chang 0001 A Method for Sending Confidential Messages to a Group without Trusted Parties. Search on Bibsonomy ISPA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
16Paolo D'Arco, Douglas R. Stinson On Unconditionally Secure Robust Distributed Key Distribution Centers. Search on Bibsonomy ASIACRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
16B. Prabhu, K. Srinathan, C. Pandu Rangan Trading Players for Efficiency in Unconditional Multiparty Computation. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF generalized adversaries, secure multiparty computation
16K. Srinathan, C. Pandu Rangan Tolerating Generalized Mobile Adversaries in Secure Multiparty Computation. Search on Bibsonomy INDOCRYPT The full citation details ... 2000 DBLP  DOI  BibTeX  RDF
16Markus Jakobsson, Joy Müller Improved Magic Ink Signatures Using Hints. Search on Bibsonomy Financial Cryptography The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
16Ronald Cramer, Ivan Damgård, Stefan Dziembowski, Martin Hirt, Tal Rabin Efficient Multiparty Computations Secure Against an Adaptive Adversary. Search on Bibsonomy EUROCRYPT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF
16Alexei E. Ashikhmin, Alexander Barg, Gérard D. Cohen, Llorenç Huguet i Rotger Variations on Minimal Codewords in Linear Codes. Search on Bibsonomy AAECC The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
15Deepa Rathi, Sanjeev Kumar 0001, Farhan Musanna, Deepak Singh Quantum secret sharing protocol through noisy channel with application in visual cryptography. Search on Bibsonomy Concurr. Comput. Pract. Exp. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Qi Chen, Xiaojun Ren, Li Hu, Yongzhi Cao Ideal uniform multipartite secret sharing schemes. Search on Bibsonomy Inf. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Zahra Saeidi, Ameneh Yazdi, Samaneh Mashhadi, Massoud Hadian Dehkordi, Adnan Gutub High performance image steganography integrating IWT and Hamming code within secret sharing. Search on Bibsonomy IET Image Process. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Hong Chen, Liang Feng Zhang A Dynamic Proactive Secret Sharing Scheme for Quadratic Functions. Search on Bibsonomy IEEE Access The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Yantao Yu, Xiaoping Xue 0002, Jingxiao Ma, Ellen Z. Zhang, Yunguo Guan, Rongxing Lu Efficient Privacy-Preserving Task Allocation With Secret Sharing for Vehicular Crowdsensing. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Ching-Nung Yang, Peng Li 0050, Hsiang-Han Cheng, Hsin-Chuan Kuo, Ming-Chan Lu, Lizhi Xiong A Security Model of Multihospital FHIR Database Authorization Based on Secret Sharing and Blockchain. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Fulin Li, Tingyan Chen, Meng Li 0006, Changlu Lin Efficient and Verifiable General Quantum Secret Sharing Based on Special Entangled State. Search on Bibsonomy IEEE Internet Things J. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Shreyshi Shree, Chen Zhou, Masoud Barati Data protection in internet of medical things using blockchain and secret sharing method. Search on Bibsonomy J. Supercomput. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Fulin Li, Hang Hu 0015, Shixin Zhu, Jiayun Yan A fully dynamic multi-secret sharing scheme with redundant authorization. Search on Bibsonomy Cryptogr. Commun. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Prashanti Guttikonda, Nirupama Bhat Mundukur Cheating identifiable polynomial based secret sharing scheme for audio and image. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15M. Raviraja Holla, Suma D., Alwyn R. Pais Accelerating randomized image secret sharing with GPU: contrast enhancement and secure reconstruction using progressive and convolutional approaches. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Hui Shi, Ziyi Zhou, Jianhao Qin, Jianing Geng, Mingchu Li A reversible data hiding in encrypted image based on additive secret sharing with adaptive bit-plane prediction. Search on Bibsonomy Multim. Tools Appl. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Shogo Chiwaki, Ryutaroh Matsumoto Performance Comparison of the Two Reconstruction Methods for Stabilizer-Based Quantum Secret Sharing. Search on Bibsonomy IEICE Trans. Fundam. Electron. Commun. Comput. Sci. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Masahito Hayashi, Takeshi Koshiba Universal Adaptive Construction of Verifiable Secret Sharing and Its Application to Verifiable Secure Distributed Data Storage. Search on Bibsonomy IEEE/ACM Trans. Netw. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Shannon Veitch, Douglas R. Stinson Unconditionally secure non-malleable secret sharing and circular external difference families. Search on Bibsonomy Des. Codes Cryptogr. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Lu Zhang, Guohui Li 0001, Ling Yuan, Xuanang Ding, Qian Rong HN3S: A Federated AutoEncoder framework for Collaborative Filtering via Hybrid Negative Sampling and Secret Sharing. Search on Bibsonomy Inf. Process. Manag. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Zhongyun Hua, Xingyu Liu, Yifeng Zheng, Shuang Yi, Yushu Zhang Reversible Data Hiding Over Encrypted Images via Preprocessing-Free Matrix Secret Sharing. Search on Bibsonomy IEEE Trans. Circuits Syst. Video Technol. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Rémi A. Chou Distributed Secret Sharing Over a Public Channel From Correlated Random Variables. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Chaoping Xing, Chen Yuan 0003 Evolving Secret Sharing Schemes Based on Polynomial Evaluations and Algebraic Geometry Codes. Search on Bibsonomy IEEE Trans. Inf. Theory The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
15Zhihua Xia, Qi Gu, Lizhi Xiong, Wenhao Zhou Privacy-preserving image retrieval based on additive secret sharing. Search on Bibsonomy Int. J. Auton. Adapt. Commun. Syst. The full citation details ... 2024 DBLP  DOI  BibTeX  RDF
Displaying result #401 - #500 of 3139 (100 per page; Change: )
Pages: [<<][1][2][3][4][5][6][7][8][9][10][11][12][13][14][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by L3S.
Previously maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license