Journal articles on the topic 'SECRET SHARING SYSTEM'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'SECRET SHARING SYSTEM.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Errahmani, Hichem Bouchakour, and Hind Ikni. "A New Approach to Verifying and Sharing a Secret QR Code using Elliptic Curves." Malaysian Journal of Computing and Applied Mathematics 3, no. 1 (June 30, 2020): 55–65. http://dx.doi.org/10.37231/myjcam.2020.3.1.44.
Full textChoudhary, Shipra PraveenKumar, Apeksha Katarni, Shweta Manjrekar, Mrs Vidyullata Devmane, and Mrs Vaishali Hirlekar. "Secret Sharing Approach in Multi-database System." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 6 (April 20, 2016): 6819–23. http://dx.doi.org/10.24297/ijct.v15i6.1606.
Full textAlahmadi, Adel, Alaa Altassan, Ahmad AlKenani, Selda Çalkavur, Hatoon Shoaib, and Patrick Solé. "A Multisecret-Sharing Scheme Based on LCD Codes." Mathematics 8, no. 2 (February 18, 2020): 272. http://dx.doi.org/10.3390/math8020272.
Full textS.Patil, Rupali, Sonali Patil, and Sudeep D. Thepade. "Secret Sharing based Secure Authentication System." International Journal of Computer Applications 118, no. 22 (May 20, 2015): 8–11. http://dx.doi.org/10.5120/20875-3613.
Full textMiyamoto, Toshiyuki, Shinji Doi, Hiroki Nogawa, and Sadatoshi Kumagai. "Autonomous distributed secret sharing storage system." Systems and Computers in Japan 37, no. 6 (2006): 55–63. http://dx.doi.org/10.1002/scj.20388.
Full textErrahmani, Hichem Bouchakour, and Hind Ikni. "Verifiable Self-Selecting Secret Sharing Based on Elliptic Curves." International Journal of Software Innovation 8, no. 3 (July 2020): 51–68. http://dx.doi.org/10.4018/ijsi.2020070104.
Full textHashim, Ashwaq T., and Suhad A. Ali. "Reversible Multiple Image Secret Sharing Using Discrete Haar Wavelet Transform." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (December 1, 2018): 5004. http://dx.doi.org/10.11591/ijece.v8i6.pp5004-5013.
Full textLi, Ying, Hong Min Jiang, and Tao Hu. "A Study on Distributed License Authorization System Based on Threshold Secret Sharing." Applied Mechanics and Materials 380-384 (August 2013): 2749–52. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2749.
Full textLai, Chun-Pong, and Cunsheng Ding. "Several Generalizations of Shamir's Secret Sharing Scheme." International Journal of Foundations of Computer Science 15, no. 02 (April 2004): 445–58. http://dx.doi.org/10.1142/s0129054104002510.
Full textXu, Guoai, Jiangtao Yuan, Guosheng Xu, and Xingxing Jia. "A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier." Information Technology and Control 50, no. 2 (June 17, 2021): 236–46. http://dx.doi.org/10.5755/j01.itc.50.2.27789.
Full textLatha, G. "Efficient Local Secret Sharing for Distributed Blockchain Systems." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 2043–48. http://dx.doi.org/10.22214/ijraset.2021.35445.
Full textDeng, Haoyuan, and Ershun Du. "Secret-sharing in distributed power system optimization." iEnergy 1, no. 3 (September 2022): 278. http://dx.doi.org/10.23919/ien.2022.0038.
Full textZhou, Jun, and Zhen Yu Yang. "Data Privacy Preservation in Wireless Sensor Networks Based on Multi-Secret Sharing Scheme." Applied Mechanics and Materials 411-414 (September 2013): 141–44. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.141.
Full textTian, Junfeng, and Yue Li. "Anticollusion Attack Strategy Combining Trust Metrics and Secret Sharing for Friendships Protection." Security and Communication Networks 2021 (July 5, 2021): 1–14. http://dx.doi.org/10.1155/2021/9717747.
Full textMesnager, Sihem, Ahmet Sınak, and Oğuz Yayla. "Threshold-Based Post-Quantum Secure Verifiable Multi-Secret Sharing for Distributed Storage Blockchain." Mathematics 8, no. 12 (December 14, 2020): 2218. http://dx.doi.org/10.3390/math8122218.
Full textHashim, Ashwaq Talib, and Zaid Mundher Radeef. "Multiple Image Secret Sharing based on Linear System." Indian Journal of Science and Technology 10, no. 33 (September 16, 2017): 1–17. http://dx.doi.org/10.17485/ijst/2017/v10i33/113085.
Full textHAYASHI, D. "Automatic Repair Mechanism of Secret Sharing Storage System." IEICE Transactions on Information and Systems E88-D, no. 5 (May 1, 2005): 971–75. http://dx.doi.org/10.1093/ietisy/e88-d.5.971.
Full textM. G. Al-Saidi, N., and M. M. Abdulhadi. "E–Voting System based on Secret Sharing Scheme." Engineering and Technology Journal 35, no. 1B (January 1, 2017): 13–18. http://dx.doi.org/10.30684/etj.35.1b.3.
Full textFramner, Erik, Simone Fischer-Hübner, Thomas Lorünser, Ala Sarah Alaqra, and John Sören Pettersson. "Making secret sharing based cloud storage usable." Information & Computer Security 27, no. 5 (November 11, 2019): 647–67. http://dx.doi.org/10.1108/ics-01-2019-0016.
Full textQin, Hua Wang, Xiao Hua Zhu, and Yue Wei Dai. "A Leakproof Secret Sharing Scheme Based on Environment Sensing." Applied Mechanics and Materials 665 (October 2014): 647–53. http://dx.doi.org/10.4028/www.scientific.net/amm.665.647.
Full textChang, Joy, Bo-Yuan Huang, and Justie Juan. "A New Visual Multi-Secrets Sharing Scheme by Random Grids." Cryptography 2, no. 3 (September 17, 2018): 24. http://dx.doi.org/10.3390/cryptography2030024.
Full textYadav, Mainejar, and Ranvijay . "Emerging Trends in Visual Secret Sharing." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 374. http://dx.doi.org/10.14419/ijet.v7i3.12.16110.
Full textMIYAMOTO, T., Y. MORITA, and S. KUMAGAI. "Vertical Partitioning Method for Secret Sharing Distributed Database System." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A, no. 11 (November 1, 2006): 3244–49. http://dx.doi.org/10.1093/ietfec/e89-a.11.3244.
Full textYamamoto, Hirosuke. "Secret sharing system using (k, L, n) threshold scheme." Electronics and Communications in Japan (Part I: Communications) 69, no. 9 (1986): 46–54. http://dx.doi.org/10.1002/ecja.4410690906.
Full textAl-Najjar, Hazem, and Nadia Al-Rousan. "SSDLP: Sharing Secret Data between Leader and Participant." Chinese Journal of Engineering 2014 (January 14, 2014): 1–7. http://dx.doi.org/10.1155/2014/736750.
Full textLi, Ping, Shengjun Li, Hongyang Yan, Lishan Ke, Teng Huang, and Alzubair Hassan. "A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme." Complexity 2020 (March 13, 2020): 1–13. http://dx.doi.org/10.1155/2020/1784276.
Full textChen, Hefeng, and Chin-Chen Chang. "A Novel (t,n) Secret Sharing Scheme Based upon Euler’s Theorem." Security and Communication Networks 2019 (April 1, 2019): 1–7. http://dx.doi.org/10.1155/2019/2387358.
Full textCheng, Jingwen, Xuehu Yan, Lintao Liu, Yue Jiang, and Xuan Wang. "Meaningful Secret Image Sharing with Saliency Detection." Entropy 24, no. 3 (February 26, 2022): 340. http://dx.doi.org/10.3390/e24030340.
Full textYu, Haoyang, Junwei Zhang, Zixiao Xiang, Biao Liu, and Huamin Feng. "Lossless Reversible Data Hiding in Encrypted Image for Multiple Data Hiders Based on Pixel Value Order and Secret Sharing." Sensors 23, no. 10 (May 18, 2023): 4865. http://dx.doi.org/10.3390/s23104865.
Full textWan, Song, Yuliang Lu, Xuehu Yan, and Lintao Liu. "A Novel Visual Secret Sharing Scheme Based on QR Codes." International Journal of Digital Crime and Forensics 9, no. 3 (July 2017): 38–48. http://dx.doi.org/10.4018/ijdcf.2017070104.
Full textPrasetyo, Heri, Chih-Hsien Hsia, and Alim Wicaksono Hari Prayuda. "Progressive Secret Sharing with Adaptive Priority and Perfect Reconstruction." Journal of Imaging 7, no. 4 (April 3, 2021): 70. http://dx.doi.org/10.3390/jimaging7040070.
Full textXie, Hui Juan, Wei She, and Chang Hao Han. "Shamir's Threshold Scheme to Ensure Security in Cloud Computing Services." Applied Mechanics and Materials 543-547 (March 2014): 3632–35. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3632.
Full textLee, Jae Hwan, and Jong Hwan Park. "Broadcast Encryption System Using Secret Sharing and Subset Difference Methods." Journal of Broadcast Engineering 20, no. 1 (January 30, 2015): 92–109. http://dx.doi.org/10.5909/jbe.2015.20.1.92.
Full textLee, Chul-Ung, Hyoung Joong Kim, Jong Hyuk Park, Sang-Soo Yeo, and Jaesoo Yang. "A Pervasive Secret Sharing Scheme For Embedded Visual Communication System." Intelligent Automation & Soft Computing 16, no. 3 (January 2010): 433–47. http://dx.doi.org/10.1080/10798587.2010.10643091.
Full textTejedor-Romero, Marino, David Orden, Ivan Marsa-Maestre, Javier Junquera-Sanchez, and Jose Manuel Gimenez-Guzman. "Distributed Remote E-Voting System Based on Shamir’s Secret Sharing Scheme." Electronics 10, no. 24 (December 9, 2021): 3075. http://dx.doi.org/10.3390/electronics10243075.
Full textWu, Zhen, Yining Liu, and Xingxing Jia. "A Novel Hierarchical Secret Image Sharing Scheme with Multi-Group Joint Management." Mathematics 8, no. 3 (March 19, 2020): 448. http://dx.doi.org/10.3390/math8030448.
Full textP, Harshith, Kiran Kumar S R, KorniSesidhar Reddy, Srujan Reddy N, and Jyothi M. "SECRET IMAGE SHARING AND IDENTIFYING FAKE IMAGE USING BLOCK CHAIN." International Research Journal of Computer Science 9, no. 8 (August 13, 2022): 262–66. http://dx.doi.org/10.26562/irjcs.2022.v0908.21.
Full textAhmed, Ali, and Loay George. "Compression image sharing using DCT- Wavelet transform and coding by Blackely method." Iraqi Journal for Computers and Informatics 43, no. 1 (June 30, 2017): 28–39. http://dx.doi.org/10.25195/ijci.v43i1.74.
Full textYang, Yu Guang, and Hai Ping Chai. "A Trusted Multi-Party Authentication Scheme Based on Proactive-ElGamal Threshold Secret Sharing System." Applied Mechanics and Materials 235 (November 2012): 20–24. http://dx.doi.org/10.4028/www.scientific.net/amm.235.20.
Full textHosseini Beghaeiraveri, Seyed Amir, Mohammad Izadi, and Mohsen Rezvani. "Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing." Security and Communication Networks 2020 (August 1, 2020): 1–10. http://dx.doi.org/10.1155/2020/9428457.
Full textSankpal, Apurva, Adarsh Singh, Sanket Takalkar, Shubham Varma, and Prof Ayesha Sayyed. "Data Concealment Using Steganography Technique." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 5257–64. http://dx.doi.org/10.22214/ijraset.2022.43185.
Full textLee, Jae Hwan, and Jong Hwan Park. "2-Subset Difference Broadcast Encryption System Based on Secret Sharing Method." Journal of Broadcast Engineering 20, no. 4 (July 30, 2015): 580–97. http://dx.doi.org/10.5909/jbe.2015.20.4.580.
Full textLee, Jae Hwan, and Jong Hwan Park. "A Transmission-Efficient Broadcast Encryption System Based on Secret Sharing Method." Journal of Broadcast Engineering 21, no. 3 (May 30, 2016): 412–24. http://dx.doi.org/10.5909/jbe.2016.21.3.412.
Full textMiyamoto, Toshiyuki, and Takeshi Ikemura. "Subquery Allocation Problem and Heuristics for Secret Sharing Distributed Database System." Journal of Computer Systems, Networks, and Communications 2010 (2010): 1–6. http://dx.doi.org/10.1155/2010/984059.
Full textSulaiman, Eric Christiandi, and Mariskha Tri Adithia. "THE VISUAL SECRET SHARING SCHEME BASED ON THE RGB COLOR SYSTEM." JUTI: Jurnal Ilmiah Teknologi Informasi 15, no. 1 (January 1, 2017): 56. http://dx.doi.org/10.12962/j24068535.v15i1.a635.
Full textLi, Li, M. Shamim Hossain, Ahmed A. Abd El-Latif, and M. F. Alhamid. "Distortion less secret image sharing scheme for Internet of Things system." Cluster Computing 22, S1 (November 30, 2017): 2293–307. http://dx.doi.org/10.1007/s10586-017-1345-y.
Full textSong, You-Jin, Seokmo Gu, and Yei-Chang Kim. "A Study on the Distributed Transcoding System using Secret Sharing Techniques." Journal of Digital Convergence 12, no. 11 (November 28, 2014): 233–39. http://dx.doi.org/10.14400/jdc.2014.12.11.233.
Full textLiu, Yuan, Licheng Wang, Xiaoying Shen, Lixiang Li, and Dezhi An. "Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes." Security and Communication Networks 2020 (August 7, 2020): 1–11. http://dx.doi.org/10.1155/2020/2345369.
Full textBezzateev, Sergey, Vadim Davydov, and Aleksandr Ometov. "On Secret Sharing with Newton’s Polynomial for Multi-Factor Authentication." Cryptography 4, no. 4 (December 1, 2020): 34. http://dx.doi.org/10.3390/cryptography4040034.
Full textCree, Joy, and Alex May. "Code-routing: a new attack on position verification." Quantum 7 (August 9, 2023): 1079. http://dx.doi.org/10.22331/q-2023-08-09-1079.
Full text