Artículos de revistas sobre el tema "Leakage resilient secret sharing"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "Leakage resilient secret sharing".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Dai, ShuGuang, JinFeng Wei y FangGuo Zhang. "Memory leakage-resilient secret sharing schemes". Science China Information Sciences 58, n.º 11 (23 de septiembre de 2015): 1–9. http://dx.doi.org/10.1007/s11432-015-5385-8.
Texto completoLi, Ping, Shengjun Li, Hongyang Yan, Lishan Ke, Teng Huang y Alzubair Hassan. "A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme". Complexity 2020 (13 de marzo de 2020): 1–13. http://dx.doi.org/10.1155/2020/1784276.
Texto completoLabao, Alfonso y Henry Adorna. "Cryptographic Rational Secret Sharing Schemes over General Networks". Cryptography 6, n.º 4 (1 de octubre de 2022): 50. http://dx.doi.org/10.3390/cryptography6040050.
Texto completoMaitra, Arpita y Goutam Paul. "A Resilient Quantum Secret Sharing Scheme". International Journal of Theoretical Physics 54, n.º 2 (26 de junio de 2014): 398–408. http://dx.doi.org/10.1007/s10773-014-2233-3.
Texto completoZhou, Yanwei, Bo Yang, Tao Wang, Zhe Xia y Hongxia Hou. "Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings". Computer Journal 63, n.º 4 (13 de noviembre de 2019): 508–24. http://dx.doi.org/10.1093/comjnl/bxz085.
Texto completoGuo, Yuyan, Jiguo Li, Mingming Jiang, Lei Yu y Shimin Wei. "Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model". Security and Communication Networks 2020 (28 de junio de 2020): 1–11. http://dx.doi.org/10.1155/2020/1492681.
Texto completoHuang, Jianye, Qiong Huang y Chunhua Pan. "A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting". International Journal of Foundations of Computer Science 28, n.º 06 (septiembre de 2017): 761–80. http://dx.doi.org/10.1142/s0129054117400172.
Texto completoTang, Fei, Hongda Li, Qihua Niu y Bei Liang. "Secure Mobile Agent from Leakage-Resilient Proxy Signatures". Mobile Information Systems 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/901418.
Texto completoZhang, Yinghui, Pengzhen Lang, Dong Zheng, Menglei Yang y Rui Guo. "A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience". Security and Communication Networks 2018 (24 de junio de 2018): 1–13. http://dx.doi.org/10.1155/2018/7202598.
Texto completoTseng, Yuh–Min, Jui-Di Wu, Sen-Shan Huang y Tung-Tso Tsai. "Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server". Information Technology And Control 49, n.º 4 (19 de diciembre de 2020): 464–81. http://dx.doi.org/10.5755/j01.itc.49.4.25927.
Texto completoWu, Zhen, Yining Liu y Xingxing Jia. "A Novel Hierarchical Secret Image Sharing Scheme with Multi-Group Joint Management". Mathematics 8, n.º 3 (19 de marzo de 2020): 448. http://dx.doi.org/10.3390/math8030448.
Texto completoZhang, Xiujie, Xingbing Fu, Lu Hong, Yu Liu y Liangliang Wang. "Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network". International Journal of Distributed Sensor Networks 16, n.º 6 (junio de 2020): 155014772092873. http://dx.doi.org/10.1177/1550147720928733.
Texto completoZhao, Xuemei, Tongtong Zhang, Jun Liu, Canju Lu, Huan Lu y Xuehu Yan. "Applying Secret Image Sharing to Economics". International Journal of Digital Crime and Forensics 13, n.º 4 (julio de 2021): 16–25. http://dx.doi.org/10.4018/ijdcf.20210701.oa2.
Texto completoQihong Yu, Qihong Yu, Jian Shen Qihong Yu, Jin-Feng Lai Jian Shen y Sai Ji Jin-Feng Lai. "Continuous Leakage-resilient and Hierarchical Identity-based Online/Offline Encryption". 網際網路技術學刊 23, n.º 6 (noviembre de 2022): 1287–96. http://dx.doi.org/10.53106/160792642022112306011.
Texto completoZhang, Yinghui, Menglei Yang, Dong Zheng, Tiantian Zhang, Rui Guo y Fang Ren. "Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity". International Journal of Foundations of Computer Science 30, n.º 04 (junio de 2019): 665–81. http://dx.doi.org/10.1142/s0129054119400197.
Texto completoLabao, Alfonso y Henry Adorna. "A CCA-PKE Secure-Cryptosystem Resilient to Randomness Reset and Secret-Key Leakage". Cryptography 6, n.º 1 (4 de enero de 2022): 2. http://dx.doi.org/10.3390/cryptography6010002.
Texto completoChen, Xiu-Bo, Gang Xu, Yuan Su y Yi-Xian Yang. "Robust variations of secret sharing through noisy quantum channel". Quantum Information and Computation 14, n.º 7&8 (mayo de 2014): 589–607. http://dx.doi.org/10.26421/qic14.7-8-4.
Texto completoZhang, En, Peiyan Yuan y Jiao Du. "Verifiable Rational Secret Sharing Scheme in Mobile Networks". Mobile Information Systems 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/462345.
Texto completoZhenhua Tan, Danke Wu, Hong Li, Tianhan Gao y Nan Guo. "Hierarchical Threshold Secret Image Sharing Scheme Based on Birkhoff Interpolation and Matrix Projection". Research Briefs on Information and Communication Technology Evolution 4 (15 de octubre de 2018): 125–33. http://dx.doi.org/10.56801/rebicte.v4i.73.
Texto completoZhang, Li-na, Jia-qi Sun, Xiao-yu Zhang, Qing-peng Chen y Jing Zhang. "Two-level QR code scheme based on region matrix image secret sharing algorithm". Mathematical Biosciences and Engineering 20, n.º 9 (2023): 16678–704. http://dx.doi.org/10.3934/mbe.2023743.
Texto completoAlawatugoda, Janaka. "Public-Key Encryption In The Standard Model Against Strong Leakage Adversary". Computer Journal 63, n.º 12 (3 de junio de 2020): 1904–14. http://dx.doi.org/10.1093/comjnl/bxaa055.
Texto completoSharma, Shantanu, Yin Li, Sharad Mehrotra, Nisha Panwar, Komal Kumari y Swagnik Roychoudhury. "Information-Theoretically Secure and Highly Efficient Search and Row Retrieval". Proceedings of the VLDB Endowment 16, n.º 10 (junio de 2023): 2391–403. http://dx.doi.org/10.14778/3603581.3603582.
Texto completoLiu, Yuan, Licheng Wang, Xiaoying Shen, Lixiang Li y Dezhi An. "Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes". Security and Communication Networks 2020 (7 de agosto de 2020): 1–11. http://dx.doi.org/10.1155/2020/2345369.
Texto completoBras-Amorós. "Ideals of Numerical Semigroups and Error-Correcting Codes". Symmetry 11, n.º 11 (14 de noviembre de 2019): 1406. http://dx.doi.org/10.3390/sym11111406.
Texto completoYu, Qihong, Jiguo Li y Sai Ji. "Hierarchical Identity-Based Online/Offline Encryption Scheme with Leakage Resilience". Security and Communication Networks 2022 (30 de noviembre de 2022): 1–11. http://dx.doi.org/10.1155/2022/6849761.
Texto completoXU, JUAN, HANWU CHEN y ZHIHAO LIU. "A SIMPLE AND SECURE QUANTUM SECRET SHARING SCHEME BASED ON PRODUCT STATES". International Journal of Quantum Information 10, n.º 03 (abril de 2012): 1250031. http://dx.doi.org/10.1142/s0219749912500311.
Texto completoR, Nesamalar y Dr Ravikumar K. "Proficient and Safe Token with Secret and Public Keys Sharing Algorithm for Preventing Cryptographic Key Leakage in Wireless Sensor Network". International Journal of Engineering Research in Electronics and Communication Engineering 9, n.º 9 (30 de agosto de 2022): 1–6. http://dx.doi.org/10.36647/ijerece/09.09.a001.
Texto completoPrabhu, Mr S., Veeramani P, Santhosh kumar C y Vijay M. "Watermarking and Encryption Technique to Avoid Data Leakage Based on Block Chain". International Journal for Research in Applied Science and Engineering Technology 11, n.º 5 (31 de mayo de 2023): 867–71. http://dx.doi.org/10.22214/ijraset.2023.51633.
Texto completoZhao, Yi, Kaitai Liang, Bo Yang y Liqun Chen. "CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs". Security and Communication Networks 2019 (31 de octubre de 2019): 1–8. http://dx.doi.org/10.1155/2019/8357241.
Texto completoChhabra, Sakshi y Ashutosh Kumar Singh. "Security Enhancement in Cloud Environment using Secure Secret Key Sharing". Journal of communications software and systems 16, n.º 4 (20 de julio de 2020): 296–307. http://dx.doi.org/10.24138/jcomss.v16i3.964.
Texto completoPavlov, Maksym y Iryna Yurchak. "Software Implementation of Modified LSB Algorithm with Shamir`s Secret Sharing". Advances in Cyber-Physical Systems 7, n.º 2 (16 de diciembre de 2022): 130–39. http://dx.doi.org/10.23939/acps2022.02.130.
Texto completoQin, Su-Juan y Feng Liu. "Information Leakage in Quantum Secret Sharing of Multi-Bits by an Entangled Six-Qubit State". International Journal of Theoretical Physics 53, n.º 9 (16 de abril de 2014): 3116–23. http://dx.doi.org/10.1007/s10773-014-2108-7.
Texto completoFeng, Tao, Dewei Wang y Renbin Gong. "A Blockchain-Based Efficient and Verifiable Attribute-Based Proxy Re-Encryption Cloud Sharing Scheme". Information 14, n.º 5 (9 de mayo de 2023): 281. http://dx.doi.org/10.3390/info14050281.
Texto completoZhang, Lina, Tong Wang, Xiangqin Zheng, Junhan Yang y Liping Lv. "Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things". Security and Communication Networks 2021 (12 de noviembre de 2021): 1–12. http://dx.doi.org/10.1155/2021/1721925.
Texto completoHwang, Yong-Woon, Su-Hyun Kim, Daehee Seo y Im-Yeong Lee. "An SKP-ABE Scheme for Secure and Efficient Data Sharing in Cloud Environments". Wireless Communications and Mobile Computing 2022 (17 de junio de 2022): 1–18. http://dx.doi.org/10.1155/2022/1384405.
Texto completoBhagat, Payal y Amar Buchade. "A Survey on Leakage-Resilient KASE for Group Data Sharing with Auxiliary Input via Cloud Storage". IJARCCE 6, n.º 4 (30 de abril de 2017): 95–98. http://dx.doi.org/10.17148/ijarcce.2017.6419.
Texto completoLiu, Chenlei, Feng Xiang y Zhixin Sun. "Multiauthority Attribute-Based Access Control for Supply Chain Information Sharing in Blockchain". Security and Communication Networks 2022 (12 de abril de 2022): 1–18. http://dx.doi.org/10.1155/2022/8497628.
Texto completoLi, Zhenfei, Malin Premaratne y Weiren Zhu. "Advanced encryption method realized by secret shared phase encoding scheme using a multi-wavelength metasurface". Nanophotonics 9, n.º 11 (4 de julio de 2020): 3687–96. http://dx.doi.org/10.1515/nanoph-2020-0298.
Texto completoZhang, Wenbo, Jing Zhang, Yifei Shi y Jingyu Feng. "UIV-TSP: A Blockchain-Enabled Antileakage Sharing Protection Scheme for Undisclosed IIoT Vulnerabilities". Security and Communication Networks 2022 (10 de octubre de 2022): 1–17. http://dx.doi.org/10.1155/2022/2500213.
Texto completoKu-Cauich, Juan Carlos y Guillermo Morales-Luna. "A linear code based on resilient Boolean maps whose dual is a platform for a robust secret sharing scheme". Linear Algebra and its Applications 596 (julio de 2020): 216–29. http://dx.doi.org/10.1016/j.laa.2020.03.010.
Texto completoSona, G., P. Annapandi y Boopathy Yamni. "Inscribing in to an Control Attempt against Jammer Attack Using FB Decoding Mechanism". Applied Mechanics and Materials 573 (junio de 2014): 412–17. http://dx.doi.org/10.4028/www.scientific.net/amm.573.412.
Texto completoPeeters, Roel, Dave Singelée y Bart Preneel. "Threshold-Based Location-Aware Access Control". International Journal of Handheld Computing Research 2, n.º 3 (julio de 2011): 22–37. http://dx.doi.org/10.4018/jhcr.2011070102.
Texto completoLong, Jing, Dafang Zhang, Wei Liang y Xia'an Bi. "Signature Restoration for Enhancing Robustness of FPGA IP Designs". International Journal of Information Security and Privacy 9, n.º 3 (julio de 2015): 41–56. http://dx.doi.org/10.4018/ijisp.2015070103.
Texto completoMa, Chunguang, Juyan Li y Weiping Ouyang. "Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment". International Journal of Foundations of Computer Science 28, n.º 06 (septiembre de 2017): 645–60. http://dx.doi.org/10.1142/s0129054117400111.
Texto completoDamgård, Ivan, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter y Michael Bæksvang Østergaard. "Fast threshold ECDSA with honest majority1". Journal of Computer Security 30, n.º 1 (20 de enero de 2022): 167–96. http://dx.doi.org/10.3233/jcs-200112.
Texto completoPasserini, Federico y Andrea M. Tonello. "Secure PHY Layer Key Generation in the Asymmetric Power Line Communication Channel". Electronics 9, n.º 4 (2 de abril de 2020): 605. http://dx.doi.org/10.3390/electronics9040605.
Texto completoZhang, Denghui, Lijing Ren, Muhammad Shafiq y Zhaoquan Gu. "A Privacy Protection Framework for Medical Image Security without Key Dependency Based on Visual Cryptography and Trusted Computing". Computational Intelligence and Neuroscience 2023 (31 de enero de 2023): 1–11. http://dx.doi.org/10.1155/2023/6758406.
Texto completoZhang, Lizhe, Zhenghang You, Kenian Wang y Zihan Cui. "Research on Access Control Scheme of System Wide Information Management Based on Attribute Association". Security and Communication Networks 2022 (30 de mayo de 2022): 1–15. http://dx.doi.org/10.1155/2022/6181995.
Texto completoLavanya, D. L., R. Ramaprabha y K. Gunaseelan. "Privacy Preserving Physical Layer Authentication Scheme for LBS based Wireless Networks". Defence Science Journal 71, n.º 2 (10 de marzo de 2021): 241–47. http://dx.doi.org/10.14429/dsj.71.15355.
Texto completoMing, Yang y Tingting Zhang. "Efficient Privacy-Preserving Access Control Scheme in Electronic Health Records System". Sensors 18, n.º 10 (18 de octubre de 2018): 3520. http://dx.doi.org/10.3390/s18103520.
Texto completo