Dissertations / Theses on the topic 'SECRET SHARING SYSTEM'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 26 dissertations / theses for your research on the topic 'SECRET SHARING SYSTEM.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse dissertations / theses on a wide variety of disciplines and organise your bibliography correctly.
Olsson, Fredrik. "A Lab System for Secret Sharing." Thesis, Linköping University, Department of Electrical Engineering, 2004. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-2385.
Full textAl-Adhami, Ayad. "A secure quorum based multi-tag RFID system." Thesis, University of Plymouth, 2018. http://hdl.handle.net/10026.1/12821.
Full textReistad, Tord Ingolf. "A General Framework for Multiparty Computations." Doctoral thesis, Norges teknisk-naturvitenskapelige universitet, Institutt for telematikk, 2012. http://urn.kb.se/resolve?urn=urn:nbn:no:ntnu:diva-16567.
Full textGoh, Vik Tor. "Intrusion detection framework for encrypted networks." Thesis, Queensland University of Technology, 2010. https://eprints.qut.edu.au/41733/1/Vik_Tor_Goh_Thesis.pdf.
Full textWang, Zhaohong. "Information-Theoretic Secure Outsourced Computation in Distributed Systems." UKnowledge, 2016. http://uknowledge.uky.edu/ece_etds/88.
Full textTraverso, Giulia [Verfasser], Johannes [Akademischer Betreuer] Buchmann, and Reihaneh [Akademischer Betreuer] Safavi-Naini. "Long-Term Confidential Secret Sharing-Based Distributed Storage Systems / Giulia Traverso ; Johannes Buchmann, Reihaneh Safavi-Naini." Darmstadt : Universitäts- und Landesbibliothek Darmstadt, 2019. http://d-nb.info/1188410377/34.
Full textLeung, Philip, and Daniel Svensson. "SecuRES: Secure Resource Sharing System : AN INVESTIGATION INTO USE OF PUBLIC LEDGER TECHNOLOGY TO CREATE DECENTRALIZED DIGITAL RESOURCE-SHARING SYSTEMS." Thesis, KTH, Skolan för informations- och kommunikationsteknik (ICT), 2015. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-187348.
Full textSubbiah, Arun. "Efficient Proactive Security for Sensitive Data Storage." Diss., Georgia Institute of Technology, 2007. http://hdl.handle.net/1853/19719.
Full textTimilsina, Santosh. "Physical Layer Security in Training-Based Single-Hop/Dual-Hop Massive MIMO Systems." OpenSIUC, 2018. https://opensiuc.lib.siu.edu/theses/2376.
Full textХіцко, Яна Володимирівна. "Математичне моделювання задач криптографії та обробки сигналів з використанням неканонічних гіперкомплексних числових систем". Thesis, НТУУ "КПІ", 2016. https://ela.kpi.ua/handle/123456789/15092.
Full textEneroth, Nathanael. "Securing LBO VoLTE roaming with multiple Escrow Agents : A dynamic approach to distribute cryptographic keys to Escrow Agents." Thesis, KTH, Radio Systems Laboratory (RS Lab), 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-240425.
Full textGhorbanzadeh, Mohammad. "Resource Allocation and End-to-End Quality of Service for Cellular Communications Systems in Congested and Contested Environments." Diss., Virginia Tech, 2015. http://hdl.handle.net/10919/64390.
Full textKendric, Hood A. "Improving Cryptocurrency Blockchain Security and Availability Adaptive Security and Partitioning." Kent State University / OhioLINK, 2020. http://rave.ohiolink.edu/etdc/view?acc_num=kent1595038779436782.
Full textWu, Wen-Pei, and 吳文霈. "The Application System of Visual Secret Sharing." Thesis, 2000. http://ndltd.ncl.edu.tw/handle/38532200371632951306.
Full textHuang, Jian-Ying, and 黃建螢. "Android System Development on Secret Audio Sharing Scheme." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/98008317608328267553.
Full textLiu, Yu-Chen, and 劉昱辰. "Android System Development on Progressive Secret Image Sharing Scheme." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/13829734937488762374.
Full textLin, Cheng-Ting, and 林正庭. "A Secret-Sharing-Based Method for Cloud Storage System." Thesis, 2015. http://ndltd.ncl.edu.tw/handle/69726621877613632163.
Full textChiang, Mao-Yuan, and 江茂源. "A Traceable Video Watermark System Using Threshold Secret Sharing." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/81714115345003941789.
Full text林宜萱. "The Research of Authentication-based Steganography in a Secret Sharing System." Thesis, 2006. http://ndltd.ncl.edu.tw/handle/buyvsg.
Full textChou, Teng-Tai, and 周登泰. "A Private Online System for Executing Wills Based on A Secret Sharing Mechanism." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/66511802848775923479.
Full textYu-TingHuang and 黃鈺婷. "An SLA-aware Data Dispersion Method for Short-Secret-Sharing Cloud Storage System." Thesis, 2013. http://ndltd.ncl.edu.tw/handle/24484662428767207595.
Full textLin, Hsiao-Hsuan, and 林筱旋. "Secret Sharing by Linear Systems." Thesis, 2010. http://ndltd.ncl.edu.tw/handle/71262958583303593109.
Full text(6012225), Huian Li. "Transparent and Mutual Restraining Electronic Voting." Thesis, 2019.
Find full textShen, Chien-Chih, and 沈建志. "Cryptography in Secret Sharing Schemes Applied to Communication Systems." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/62379340040190193290.
Full textTraverso, Giulia. "Long-Term Confidential Secret Sharing-Based Distributed Storage Systems." Phd thesis, 2019. https://tuprints.ulb.tu-darmstadt.de/8762/1/Traverso_Long_Term_Storage_Systems.pdf.
Full textChen, Pin-Yu, and 陳品佑. "Dynamic Threshold Secret Sharing Schemes with Mobile Systems and Applications." Thesis, 2008. http://ndltd.ncl.edu.tw/handle/63191612761674664758.
Full text