The FacetedDBLP logo    Search for: in:

Disable automatic phrases ?     Syntactic query expansion: ?

Searching for phrase secret sharing (changed automatically) with no syntactic query expansion in all metadata.

Publication years (Num. hits)
1983-1989 (15) 1990-1992 (28) 1993-1994 (33) 1995 (16) 1996 (23) 1997 (20) 1998 (22) 1999 (28) 2000 (27) 2001 (27) 2002 (48) 2003 (55) 2004 (59) 2005 (110) 2006 (107) 2007 (88) 2008 (127) 2009 (107) 2010 (96) 2011 (126) 2012 (118) 2013 (126) 2014 (142) 2015 (146) 2016 (128) 2017 (128) 2018 (164) 2019 (34)
Publication types (Num. hits)
article(1040) book(2) incollection(15) inproceedings(1081) phdthesis(10)
GrowBag graphs for keyword ? (Num. hits/coverage)

Group by:
The graphs summarize 756 occurrences of 312 keywords

Results
Found 2148 publication records. Showing 2148 according to the selection in the facets
Hits ? Authors Title Venue Year Link Author keywords
186K. Srinathan, N. Tharani Rajan, C. Pandu Rangan Non-perfect Secret Sharing over General Access Structures. Search on Bibsonomy INDOCRYPT The full citation details ... 2002 DBLP  DOI  BibTeX  RDF non-threshold secret sharing, non-perfect secret sharing
145Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang Changing Thresholds in the Absence of Secure Channels. Search on Bibsonomy ACISP The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Threshold Changeable Secret Sharing, Shamir Secret Sharing, Geometrical Secret Sharing, Secret Sharing
137László Csirmaz The Size of a Share Must Be Large. Search on Bibsonomy J. Cryptology The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Polymatroid structures, Polymatroid structures, Secret sharing, Secret sharing, Key words, Ideal secret sharing schemes, Ideal secret sharing schemes, Perfect security, Perfect security
134Reihaneh Safavi-Naini, Huaxiong Wang Secret sharing schemes with partial broadcast channels. Search on Bibsonomy Des. Codes Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 94A17, 68P30, AMS classifications 94A62
130Jaume Martí-Farré, Carles Padró Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants. Search on Bibsonomy SCN The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Ideal access structures, Secret sharing representable matroids, Secret sharing, Ideal secret sharing schemes, Information rate
126Giovanni Di Crescenzo Sharing One Secret vs. Sharing Many Secrets: Tight Bounds for the Max Improvement Ratio. Search on Bibsonomy MFCS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Multi-Secret Sharing, Cryptography, Secret Sharing
123Phillip Rogaway, Mihir Bellare Robust computational secret sharing and a unified account of classical secret-sharing goals. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2007 DBLP  DOI  BibTeX  RDF computational secret sharing, robust computational secret-sharing, provable security, cryptographic protocols, secret sharing, survivable storage
121Oriol Farràs, Jaume Martí-Farré, Carles Padró Ideal Multipartite Secret Sharing Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Ideal access structures, Multipartite secret sharing, Multipartite matroids, Discrete polymatroids, Secret sharing, Ideal secret sharing schemes
118Shaik Maleka, Amjed Shareef, C. Pandu Rangan The deterministic protocol for rational secret sharing. Search on Bibsonomy IPDPS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
112Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. Search on Bibsonomy ISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF threshold ramp scheme, entropy, random number, Secret sharing scheme, threshold scheme, ideal secret sharing scheme, exclusive-or
110Li Bai A Reliable (k, n) Image Secret Sharing Scheme. Search on Bibsonomy DASC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF matrix projection, image processing, secret sharing
103Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen Real Perfect Contrast Visual Secret Sharing Schemes with Reversing. Search on Bibsonomy ACNS The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Visual secret sharing scheme, ideal contrast, secret sharing scheme
102Wen Ping Ma, Fu Tai Zhang New Methods to Construct Cheating Immune Multisecret Sharing Scheme. Search on Bibsonomy CISC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Quadratic Function, Cheating Immune Function, Multisecret Secret Sharing, Secret Sharing
101László Csirmaz The Size of a Share Must Be Large. Search on Bibsonomy EUROCRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF polymatroid structures, Secret sharing, ideal secret sharing schemes, perfect security
98Josef Pieprzyk, Xian-Mo Zhang Cheating Prevention in Secret Sharing over GF(pt). Search on Bibsonomy INDOCRYPT The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Nonlinear Secret Sharing, Cheating Immunity, Secret Sharing
97Amos Beimel, Tamir Tassa, Enav Weinreb Characterizing Ideal Weighted Threshold Secret Sharing. Search on Bibsonomy TCC The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
94Brian King A Comment on Group Independent Threshold Sharing. Search on Bibsonomy WISA The full citation details ... 2003 DBLP  DOI  BibTeX  RDF integer span programs, group independent threshold schemes, black-box sharing, secret sharing, threshold cryptography, monotone span programs
93Brian King Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group. Search on Bibsonomy ACISP The full citation details ... 2001 DBLP  DOI  BibTeX  RDF Linear secret sharing, Randomness requirements, Threshold secret sharing
92Lein Harn, Changlu Lin Detection and identification of cheaters in ( t , n ) secret sharing scheme. Search on Bibsonomy Des. Codes Cryptography The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Mathematics Subject Classification (2000) 94A62
92Shlomi Dolev, Limor Lahiani, Moti Yung Secret Swarm UnitReactive k-Secret Sharing. Search on Bibsonomy INDOCRYPT The full citation details ... 2007 DBLP  DOI  BibTeX  RDF mobile computing, secret sharing
90Yi-Chun Wang, Justie Su-tzu Juan Simple Multi-Secret Sharing Schemes to Achieve the Optimal Maximum Improvement Ratio. Search on Bibsonomy SUTC (2) The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
90Ernest F. Brickell Some Ideal Secret Sharing Schemes. Search on Bibsonomy EUROCRYPT The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
89Shaik Maleka, Amjed Shareef, C. Pandu Rangan Rational Secret Sharing with Repeated Games. Search on Bibsonomy ISPEC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF distributed computing, game theory, Secret sharing, repeated games
89Sergio Cabello, Carles Padró, Germán Sáez Secret Sharing Schemes with Detection of Cheaters for a General Access Structure. Search on Bibsonomy FCT The full citation details ... 1999 DBLP  DOI  BibTeX  RDF Detection of cheaters, Robust and secure schemes, Cryptography, Secret sharing schemes
88Josef Pieprzyk, Xian-Mo Zhang Cheating Prevention in Linear Secret Sharing. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF Linear Secret Sharing Schemes, Cheating Identification, Cryptography, Secret Sharing, Cheating Detection
88Benny Chor, Eyal Kushilevitz Secret Sharing Over Infinite Domains (Extended Abstract). Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
87Renato M. Capocelli, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro On the Size of Shares for Secret Sharing Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1991 DBLP  DOI  BibTeX  RDF
83Vanesa Daza, Josep Domingo-Ferrer On Partial Anonymity in Secret Sharing. Search on Bibsonomy EuroPKI The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Privacy, Protocols, Secret sharing
83Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini Secret Sharing in Multilevel and Compartmented Groups. Search on Bibsonomy ACISP The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Hierarchical and Compartmented Access Structures, Ideal Schemes, Secret Sharing, Perfect Security
83Jaume Martí-Farré, Carles Padró On Secret Sharing Schemes, Matroids and Polymatroids. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Ideal access structures, Secret sharing, Matroids, Ideal secret sharing schemes, Information rate, Polymatroids
83Brian King Requirements for Group Independent Linear Threshold Secret Sharing Schemes. Search on Bibsonomy ACISP The full citation details ... 2002 DBLP  DOI  BibTeX  RDF linear secret sharing, group independent linear threshold schemes, monotone span programs and bounds on share size, secret sharing, threshold cryptography
81Vinod Vaikuntanathan, Arvind Narayanan, K. Srinathan, C. Pandu Rangan, Kwangjo Kim On the Power of Computational Secret Sharing. Search on Bibsonomy INDOCRYPT The full citation details ... 2003 DBLP  DOI  BibTeX  RDF computationally bounded players, monotone P, Secret sharing, access structures
80Carlo Blundo, Alfredo De Santis, Roberto De Simone, Ugo Vaccaro Tight Bounds on the Information Rate of Secret Sharing Schemes. Search on Bibsonomy Des. Codes Cryptography The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Information Rate and Cryptography, Entropy, Secret Sharing, Data Security
79Hui-Xian Li, Liao-Jun Pang, Wan-Dong Cai An Efficient Threshold Multi-group-Secret Sharing Scheme. Search on Bibsonomy ICFIE The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Multi-group-secret sharing, Chinese Remain Theorem, Secret sharing, Threshold
79Hiroki Koga, Etsuyo Ueda Basic Properties of the (t, n)-Threshold Visual Secret Sharing Scheme with Perfect Reconstruction of Black Pixels. Search on Bibsonomy Des. Codes Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Secret sharing, Visual cryptography, Threshold scheme, Visual secret sharing
79Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe Mutually Trusted Authority-Free Secret Sharing Schemes. Search on Bibsonomy J. Cryptology The full citation details ... 1997 DBLP  DOI  BibTeX  RDF Key words, Secret sharing schemes, Secret sharing schemes
79Hao Chen, San Ling, Chaoping Xing Access Structures of Elliptic Secret Sharing Schemes. Search on Bibsonomy IEEE Trans. Information Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
79Yvo Desmedt, Kaoru Kurosawa, Tri Van Le Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes. Search on Bibsonomy ISC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF
78Tamir Tassa Hierarchical Threshold Secret Sharing. Search on Bibsonomy J. Cryptology The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
78Josh Cohen Benaloh, Jerry Leichter Generalized Secret Sharing and Monotone Functions. Search on Bibsonomy CRYPTO The full citation details ... 1988 DBLP  DOI  BibTeX  RDF
78Ilker Nadi Bozkurt, Kamer Kaya, Ali Aydin Selçuk Practical Threshold Signatures with Linear Secret Sharing Schemes. Search on Bibsonomy AFRICACRYPT The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Linear secret sharing, function sharing, threshold cryptography
78Huaxiong Wang, Duncan S. Wong On Secret Reconstruction in Secret Sharing Schemes. Search on Bibsonomy IEEE Trans. Information Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
78Hugo Krawczyk Secret Sharing Made Short. Search on Bibsonomy CRYPTO The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
77Stefan Droste New Results on Visual Cryptography. Search on Bibsonomy CRYPTO The full citation details ... 1996 DBLP  DOI  BibTeX  RDF Secret Sharing Problem, Secret Sharing Scheme, Visual Cryptography
76Amos Beimel, Matthew K. Franklin Weakly-Private Secret Sharing Schemes. Search on Bibsonomy TCC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
75Ching-Nung Yang, Tse-Shih Chen An Image Secret Sharing Scheme with the Capability of Previvewing the Secret Image. Search on Bibsonomy ICME The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
75Lein Harn, Hung-Yu Lin An l-Span Generalized Secret Sharing Scheme. Search on Bibsonomy CRYPTO The full citation details ... 1992 DBLP  DOI  BibTeX  RDF
73Kamer Kaya, Ali Aydin Selçuk A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem. Search on Bibsonomy INDOCRYPT The full citation details ... 2008 DBLP  DOI  BibTeX  RDF joint random secret sharing, Asmuth-Bloom secret sharing scheme, Chinese Remainder Theorem, Verifiability
73Jovan Dj. Golic On Matroid Characterization of Ideal Secret Sharing Schemes. Search on Bibsonomy J. Cryptology The full citation details ... 1998 DBLP  DOI  BibTeX  RDF Matroids, Matroids, Key words, Ideal secret sharing schemes, Ideal secret sharing schemes, Access structures, Access structures
73Amos Beimel, Noam Livne, Carles Padró Matroids Can Be Far from Ideal Secret Sharing. Search on Bibsonomy TCC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
73Ronald Cramer, Serge Fehr Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups. Search on Bibsonomy CRYPTO The full citation details ... 2002 DBLP  DOI  BibTeX  RDF
72Wei Chen, Xiang Long, Yuebin Bai, Xiaopeng Gao A New Dynamic Threshold Secret Sharing Scheme from Bilinear Maps. Search on Bibsonomy ICPP Workshops The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
72Shoulun Long, Josef Pieprzyk, Huaxiong Wang, Duncan S. Wong Generalised Cumulative Arrays in Secret Sharing. Search on Bibsonomy Des. Codes Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Cumulative array, Perfect hash family, Secret sharing
72Siaw-Lynn Ng A Representation of a Family of Secret Sharing Matroids. Search on Bibsonomy Des. Codes Cryptography The full citation details ... 2003 DBLP  DOI  BibTeX  RDF projective geometry, matroids, ideal secret sharing schemes
72Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl Asynchronous verifiable secret sharing and proactive cryptosystems. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 2002 DBLP  DOI  BibTeX  RDF model, secret sharing, asynchronous, proactive
71Chin-Chen Chang 0001, Jun-Chou Chuang, Pei-Yu Lin Sharing a Secret Two-Tone Image in Two Gray-Level Images. Search on Bibsonomy ICPADS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF data encryption, visual cryptography, image hiding, Visual secret sharing
71Hong-Hao Chen, Cheng-Chi Lee, Chih-Chiang Lee, Hsien-Chu Wu, Chwei-Shyong Tsai Multi-level visual secret sharing scheme with smooth-looking. Search on Bibsonomy Int. Conf. Interaction Sciences The full citation details ... 2009 DBLP  DOI  BibTeX  RDF code book, non-pixel expansion shares, visual cryptography, visual secret sharing
70Maged Hamada Ibrahim Verifiable Threshold Sharing of a Large Secret Safe-Prime. Search on Bibsonomy ITCC (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Robust Threshold Signature Schemes, Multi-Prime RSA, RSA Function Sharing, Threshold Cryptography, VSS
69Justie Su-tzu Juan, Chia-Li Huang Efficient Secret Sharing Schemes from Room Square. Search on Bibsonomy ICITA (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
69Tamir Tassa Hierarchical Threshold Secret Sharing. Search on Bibsonomy TCC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF
69Josh Cohen Benaloh Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing. Search on Bibsonomy CRYPTO The full citation details ... 1986 DBLP  DOI  BibTeX  RDF
68Christophe Tartary, Josef Pieprzyk, Huaxiong Wang Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF Threshold Access Structures, Share Verifiability, Keyed One-Way Functions, Chinese Remainder Theorem, Secret Sharing Scheme
68Michael Beiter Combiner Driven Management Models and Their Applications. Search on Bibsonomy WEWoRC The full citation details ... 2007 DBLP  DOI  BibTeX  RDF multi-time secret sharing, threshold schemes with update capabilities, secret sharing, management models
67Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe On Sharing Many Secrets (Extended Abstract). Search on Bibsonomy ASIACRYPT The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
67Liaojun Pang, Huixian Li, Ye Yao, Yumin Wang A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses. Search on Bibsonomy ISECS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
66Arun Subbiah, Douglas M. Blough An approach for fault tolerant and secure data storage in collaborative work environments. Search on Bibsonomy StorageSS The full citation details ... 2005 DBLP  DOI  BibTeX  RDF replication, secret sharing, confidentiality, collaborative environments, Byzantine fault tolerance, distributed data storage
66Satoshi Obana, Toshinori Araki Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution. Search on Bibsonomy ASIACRYPT The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
66Carlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro Secret Sharing Schemes with Veto Capabilities. Search on Bibsonomy Algebraic Coding The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
65Huawang Qin, Yuewei Dai, Zhiquan Wang A secret sharing scheme based on (t, n) threshold and adversary structure. Search on Bibsonomy Int. J. Inf. Sec. The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Adversary structure, Cryptography, Information security, Secret sharing, Threshold
65Jong-Phil Yang, Kyung Hyune Rhee, Kouichi Sakurai A Proactive Secret Sharing for Server Assisted Threshold Signatures. Search on Bibsonomy HPCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Fault tolerant and Distributed Computing, Secret sharing
63Amos Beimel, Noam Livne On Matroids and Nonideal Secret Sharing. Search on Bibsonomy IEEE Trans. Information Theory The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
63Jia Yu, Fanyu Kong, Rong Hao, Xuliang Li How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme. Search on Bibsonomy ISI Workshops The full citation details ... 2008 DBLP  DOI  BibTeX  RDF digital signature, forward security, bilinear maps, Computation Diffie-Hellman problem
63Amos Beimel, Noam Livne On Matroids and Non-ideal Secret Sharing. Search on Bibsonomy TCC The full citation details ... 2006 DBLP  DOI  BibTeX  RDF
63Noam Kogan, Tamir Tassa Improved efficiency for revocation schemes via Newton interpolation. Search on Bibsonomy ACM Trans. Inf. Syst. Secur. The full citation details ... 2006 DBLP  DOI  BibTeX  RDF Newton interpolation, secret sharing, broadcast encryption, User revocation
63Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. Search on Bibsonomy CRYPTO The full citation details ... 1995 DBLP  DOI  BibTeX  RDF
62Tamir Tassa, Nira Dyn Multipartite Secret Sharing by Bivariate Interpolation. Search on Bibsonomy J. Cryptology The full citation details ... 2009 DBLP  DOI  BibTeX  RDF Multipartite access structures, Compartmented access structures, Hierarchical threshold access structures, Secret sharing, Bivariate interpolation, Monotone span programs
62Rida A. Bazzi, Goran Konjevod Efficient Verification for Provably Secure Storage and Secret Sharing in Systems Where Half the Servers Are Faulty. Search on Bibsonomy DISC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF secret sharing, Byzantine failures, Secure storage
62Giovanni Di Crescenzo, Clemente Galdi Hypergraph Decomposition and Secret Sharing. Search on Bibsonomy ISAAC The full citation details ... 2003 DBLP  DOI  BibTeX  RDF Hypergraph Decomposition, Algorithms, Cryptography, Secret Sharing
61Xian-Mo Zhang, Josef Pieprzyk Cheating Immune Secret Sharing. Search on Bibsonomy ICICS The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
61Thomas Beth, Hans-Joachim Knobloch, Marcus Otten Verifiable Secret Sharing for Monotone Access Structures. Search on Bibsonomy ACM Conference on Computer and Communications Security The full citation details ... 1993 DBLP  DOI  BibTeX  RDF
59Tiancheng Lou, Christophe Tartary Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes. Search on Bibsonomy CANS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF Threshold Changeability, Security Rate, Dealer Free Update, Chinese Remainder Theorem, Secret Sharing Scheme, Information Rate
59Gonzalo Álvarez Marañón, Luis Hernández Encinas, Ángel Martín del Rey A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata. Search on Bibsonomy IbPRIA (1) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF Image processing, Cryptography, Cellular automata, Secret sharing
59Joseph Y. Halpern, Vanessa Teague Rational secret sharing and multiparty computation: extended abstract. Search on Bibsonomy STOC The full citation details ... 2004 DBLP  DOI  BibTeX  RDF iterated deletion of weakly dominated strategies, non-cooperative computing, game theory, secret sharing, multiparty computation
59Avishek Adhikari, Tridib Kumar Dutta, Bimal K. Roy A New Black and White Visual Cryptographic Scheme for General Access Structures. Search on Bibsonomy INDOCRYPT The full citation details ... 2004 DBLP  DOI  BibTeX  RDF visual secret sharing scheme, visual threshold scheme, general access structure, secret sharing scheme, visual cryptography
59Ueli M. Maurer Secure Multi-party Computation Made Simple. Search on Bibsonomy SCN The full citation details ... 2002 DBLP  DOI  BibTeX  RDF adversary structures, secret-sharing, Secure multi-party computation, verifiable secret-sharing
59Yvo Desmedt, Brian King, Berry Schoenmakers Revisiting the Karnin, Greene and Hellman Bounds. Search on Bibsonomy ICITS The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
58Li Bai Generalized Access Structure Congestion System. Search on Bibsonomy IEEE Trans. Reliability The full citation details ... 2007 DBLP  DOI  BibTeX  RDF
58Barbara Masucci Sharing Multiple Secrets: Models, Schemes and Analysis. Search on Bibsonomy Des. Codes Cryptography The full citation details ... 2006 DBLP  DOI  BibTeX  RDF 62B10, AMS Classification 94A62
57Miyuki Uno, Mikio Kano Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images. Search on Bibsonomy ICISC The full citation details ... 2008 DBLP  DOI  BibTeX  RDF
57Hui-Xian Li, Chun-Tian Cheng, Liao-Jun Pang A New (t, n)-Threshold Multi-secret Sharing Scheme. Search on Bibsonomy CIS (2) The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
57Ernest F. Brickell, Daniel M. Davenport On the Classification of Idea Secret Sharing Schemes. Search on Bibsonomy CRYPTO The full citation details ... 1989 DBLP  DOI  BibTeX  RDF
57Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran Responsive Security for Stored Data. Search on Bibsonomy IEEE Trans. Parallel Distrib. Syst. The full citation details ... 2003 DBLP  DOI  BibTeX  RDF distributed storage service, Security, data integrity, replication, availability, secret sharing, confidentiality, Byzantine fault tolerance
57Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran Responsive Security for Stored Data. Search on Bibsonomy ICDCS The full citation details ... 2003 DBLP  DOI  BibTeX  RDF distributed storage service, Security, data integrity, replication, availability, secret sharing, confidentiality, Byzantine fault tolerance
57Kai Wang, Xukai Zou, Yan Sui A Multiple Secret Sharing Scheme based on Matrix Projection. Search on Bibsonomy COMPSAC (1) The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
57Ching-Nung Yang, Tse-Shih Chen New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square Block-Wise Operation. Search on Bibsonomy ICIAR The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
55Tal Rabin Robust Sharing of Secrets When the Dealer is Honest or Cheating. Search on Bibsonomy J. ACM The full citation details ... 1994 DBLP  DOI  BibTeX  RDF
55Chuangui Ma, Rui Cheng Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks. Search on Bibsonomy Inscrypt The full citation details ... 2007 DBLP  DOI  BibTeX  RDF hierarchical secret sharing, ad-hoc network, key management, verifiable secret sharing
54Chwei-Shyong Tsai, Chin-Chen Chang 0001 A Generalized Secret Image Sharing and Recovery Scheme. Search on Bibsonomy IEEE Pacific Rim Conference on Multimedia The full citation details ... 2001 DBLP  DOI  BibTeX  RDF
54Gilad Asharov, Yehuda Lindell Utility Dependence in Correct and Fair Rational Secret Sharing. Search on Bibsonomy CRYPTO The full citation details ... 2009 DBLP  DOI  BibTeX  RDF
54Hui-Xian Li, Chun-Tian Cheng, Liao-Jun Pang An Improved Multi-stage (t, n)-Threshold Secret Sharing Scheme. Search on Bibsonomy WAIM The full citation details ... 2005 DBLP  DOI  BibTeX  RDF
Displaying result #1 - #100 of 2148 (100 per page; Change: )
Pages: [1][2][3][4][5][6][7][8][9][10][>>]
Valid XHTML 1.1! Valid CSS! [Valid RSS]
Maintained by Jörg Diederich.
Based upon DBLP by Michael Ley.
open data data released under the ODC-BY 1.0 license