Artículos de revistas sobre el tema "SECRET SHARING SYSTEM"
Crea una cita precisa en los estilos APA, MLA, Chicago, Harvard y otros
Consulte los 50 mejores artículos de revistas para su investigación sobre el tema "SECRET SHARING SYSTEM".
Junto a cada fuente en la lista de referencias hay un botón "Agregar a la bibliografía". Pulsa este botón, y generaremos automáticamente la referencia bibliográfica para la obra elegida en el estilo de cita que necesites: APA, MLA, Harvard, Vancouver, Chicago, etc.
También puede descargar el texto completo de la publicación académica en formato pdf y leer en línea su resumen siempre que esté disponible en los metadatos.
Explore artículos de revistas sobre una amplia variedad de disciplinas y organice su bibliografía correctamente.
Errahmani, Hichem Bouchakour y Hind Ikni. "A New Approach to Verifying and Sharing a Secret QR Code using Elliptic Curves". Malaysian Journal of Computing and Applied Mathematics 3, n.º 1 (30 de junio de 2020): 55–65. http://dx.doi.org/10.37231/myjcam.2020.3.1.44.
Texto completoChoudhary, Shipra PraveenKumar, Apeksha Katarni, Shweta Manjrekar, Mrs Vidyullata Devmane y Mrs Vaishali Hirlekar. "Secret Sharing Approach in Multi-database System". INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, n.º 6 (20 de abril de 2016): 6819–23. http://dx.doi.org/10.24297/ijct.v15i6.1606.
Texto completoAlahmadi, Adel, Alaa Altassan, Ahmad AlKenani, Selda Çalkavur, Hatoon Shoaib y Patrick Solé. "A Multisecret-Sharing Scheme Based on LCD Codes". Mathematics 8, n.º 2 (18 de febrero de 2020): 272. http://dx.doi.org/10.3390/math8020272.
Texto completoS.Patil, Rupali, Sonali Patil y Sudeep D. Thepade. "Secret Sharing based Secure Authentication System". International Journal of Computer Applications 118, n.º 22 (20 de mayo de 2015): 8–11. http://dx.doi.org/10.5120/20875-3613.
Texto completoMiyamoto, Toshiyuki, Shinji Doi, Hiroki Nogawa y Sadatoshi Kumagai. "Autonomous distributed secret sharing storage system". Systems and Computers in Japan 37, n.º 6 (2006): 55–63. http://dx.doi.org/10.1002/scj.20388.
Texto completoErrahmani, Hichem Bouchakour y Hind Ikni. "Verifiable Self-Selecting Secret Sharing Based on Elliptic Curves". International Journal of Software Innovation 8, n.º 3 (julio de 2020): 51–68. http://dx.doi.org/10.4018/ijsi.2020070104.
Texto completoHashim, Ashwaq T. y Suhad A. Ali. "Reversible Multiple Image Secret Sharing Using Discrete Haar Wavelet Transform". International Journal of Electrical and Computer Engineering (IJECE) 8, n.º 6 (1 de diciembre de 2018): 5004. http://dx.doi.org/10.11591/ijece.v8i6.pp5004-5013.
Texto completoLi, Ying, Hong Min Jiang y Tao Hu. "A Study on Distributed License Authorization System Based on Threshold Secret Sharing". Applied Mechanics and Materials 380-384 (agosto de 2013): 2749–52. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2749.
Texto completoLai, Chun-Pong y Cunsheng Ding. "Several Generalizations of Shamir's Secret Sharing Scheme". International Journal of Foundations of Computer Science 15, n.º 02 (abril de 2004): 445–58. http://dx.doi.org/10.1142/s0129054104002510.
Texto completoXu, Guoai, Jiangtao Yuan, Guosheng Xu y Xingxing Jia. "A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier". Information Technology and Control 50, n.º 2 (17 de junio de 2021): 236–46. http://dx.doi.org/10.5755/j01.itc.50.2.27789.
Texto completoLatha, G. "Efficient Local Secret Sharing for Distributed Blockchain Systems". International Journal for Research in Applied Science and Engineering Technology 9, n.º VI (20 de junio de 2021): 2043–48. http://dx.doi.org/10.22214/ijraset.2021.35445.
Texto completoDeng, Haoyuan y Ershun Du. "Secret-sharing in distributed power system optimization". iEnergy 1, n.º 3 (septiembre de 2022): 278. http://dx.doi.org/10.23919/ien.2022.0038.
Texto completoZhou, Jun y Zhen Yu Yang. "Data Privacy Preservation in Wireless Sensor Networks Based on Multi-Secret Sharing Scheme". Applied Mechanics and Materials 411-414 (septiembre de 2013): 141–44. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.141.
Texto completoTian, Junfeng y Yue Li. "Anticollusion Attack Strategy Combining Trust Metrics and Secret Sharing for Friendships Protection". Security and Communication Networks 2021 (5 de julio de 2021): 1–14. http://dx.doi.org/10.1155/2021/9717747.
Texto completoMesnager, Sihem, Ahmet Sınak y Oğuz Yayla. "Threshold-Based Post-Quantum Secure Verifiable Multi-Secret Sharing for Distributed Storage Blockchain". Mathematics 8, n.º 12 (14 de diciembre de 2020): 2218. http://dx.doi.org/10.3390/math8122218.
Texto completoHashim, Ashwaq Talib y Zaid Mundher Radeef. "Multiple Image Secret Sharing based on Linear System". Indian Journal of Science and Technology 10, n.º 33 (16 de septiembre de 2017): 1–17. http://dx.doi.org/10.17485/ijst/2017/v10i33/113085.
Texto completoHAYASHI, D. "Automatic Repair Mechanism of Secret Sharing Storage System". IEICE Transactions on Information and Systems E88-D, n.º 5 (1 de mayo de 2005): 971–75. http://dx.doi.org/10.1093/ietisy/e88-d.5.971.
Texto completoM. G. Al-Saidi, N. y M. M. Abdulhadi. "E–Voting System based on Secret Sharing Scheme". Engineering and Technology Journal 35, n.º 1B (1 de enero de 2017): 13–18. http://dx.doi.org/10.30684/etj.35.1b.3.
Texto completoFramner, Erik, Simone Fischer-Hübner, Thomas Lorünser, Ala Sarah Alaqra y John Sören Pettersson. "Making secret sharing based cloud storage usable". Information & Computer Security 27, n.º 5 (11 de noviembre de 2019): 647–67. http://dx.doi.org/10.1108/ics-01-2019-0016.
Texto completoQin, Hua Wang, Xiao Hua Zhu y Yue Wei Dai. "A Leakproof Secret Sharing Scheme Based on Environment Sensing". Applied Mechanics and Materials 665 (octubre de 2014): 647–53. http://dx.doi.org/10.4028/www.scientific.net/amm.665.647.
Texto completoChang, Joy, Bo-Yuan Huang y Justie Juan. "A New Visual Multi-Secrets Sharing Scheme by Random Grids". Cryptography 2, n.º 3 (17 de septiembre de 2018): 24. http://dx.doi.org/10.3390/cryptography2030024.
Texto completoYadav, Mainejar y Ranvijay . "Emerging Trends in Visual Secret Sharing". International Journal of Engineering & Technology 7, n.º 3.12 (20 de julio de 2018): 374. http://dx.doi.org/10.14419/ijet.v7i3.12.16110.
Texto completoMIYAMOTO, T., Y. MORITA y S. KUMAGAI. "Vertical Partitioning Method for Secret Sharing Distributed Database System". IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A, n.º 11 (1 de noviembre de 2006): 3244–49. http://dx.doi.org/10.1093/ietfec/e89-a.11.3244.
Texto completoYamamoto, Hirosuke. "Secret sharing system using (k, L, n) threshold scheme". Electronics and Communications in Japan (Part I: Communications) 69, n.º 9 (1986): 46–54. http://dx.doi.org/10.1002/ecja.4410690906.
Texto completoAl-Najjar, Hazem y Nadia Al-Rousan. "SSDLP: Sharing Secret Data between Leader and Participant". Chinese Journal of Engineering 2014 (14 de enero de 2014): 1–7. http://dx.doi.org/10.1155/2014/736750.
Texto completoLi, Ping, Shengjun Li, Hongyang Yan, Lishan Ke, Teng Huang y Alzubair Hassan. "A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme". Complexity 2020 (13 de marzo de 2020): 1–13. http://dx.doi.org/10.1155/2020/1784276.
Texto completoChen, Hefeng y Chin-Chen Chang. "A Novel (t,n) Secret Sharing Scheme Based upon Euler’s Theorem". Security and Communication Networks 2019 (1 de abril de 2019): 1–7. http://dx.doi.org/10.1155/2019/2387358.
Texto completoCheng, Jingwen, Xuehu Yan, Lintao Liu, Yue Jiang y Xuan Wang. "Meaningful Secret Image Sharing with Saliency Detection". Entropy 24, n.º 3 (26 de febrero de 2022): 340. http://dx.doi.org/10.3390/e24030340.
Texto completoYu, Haoyang, Junwei Zhang, Zixiao Xiang, Biao Liu y Huamin Feng. "Lossless Reversible Data Hiding in Encrypted Image for Multiple Data Hiders Based on Pixel Value Order and Secret Sharing". Sensors 23, n.º 10 (18 de mayo de 2023): 4865. http://dx.doi.org/10.3390/s23104865.
Texto completoWan, Song, Yuliang Lu, Xuehu Yan y Lintao Liu. "A Novel Visual Secret Sharing Scheme Based on QR Codes". International Journal of Digital Crime and Forensics 9, n.º 3 (julio de 2017): 38–48. http://dx.doi.org/10.4018/ijdcf.2017070104.
Texto completoPrasetyo, Heri, Chih-Hsien Hsia y Alim Wicaksono Hari Prayuda. "Progressive Secret Sharing with Adaptive Priority and Perfect Reconstruction". Journal of Imaging 7, n.º 4 (3 de abril de 2021): 70. http://dx.doi.org/10.3390/jimaging7040070.
Texto completoXie, Hui Juan, Wei She y Chang Hao Han. "Shamir's Threshold Scheme to Ensure Security in Cloud Computing Services". Applied Mechanics and Materials 543-547 (marzo de 2014): 3632–35. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3632.
Texto completoLee, Jae Hwan y Jong Hwan Park. "Broadcast Encryption System Using Secret Sharing and Subset Difference Methods". Journal of Broadcast Engineering 20, n.º 1 (30 de enero de 2015): 92–109. http://dx.doi.org/10.5909/jbe.2015.20.1.92.
Texto completoLee, Chul-Ung, Hyoung Joong Kim, Jong Hyuk Park, Sang-Soo Yeo y Jaesoo Yang. "A Pervasive Secret Sharing Scheme For Embedded Visual Communication System". Intelligent Automation & Soft Computing 16, n.º 3 (enero de 2010): 433–47. http://dx.doi.org/10.1080/10798587.2010.10643091.
Texto completoTejedor-Romero, Marino, David Orden, Ivan Marsa-Maestre, Javier Junquera-Sanchez y Jose Manuel Gimenez-Guzman. "Distributed Remote E-Voting System Based on Shamir’s Secret Sharing Scheme". Electronics 10, n.º 24 (9 de diciembre de 2021): 3075. http://dx.doi.org/10.3390/electronics10243075.
Texto completoWu, Zhen, Yining Liu y Xingxing Jia. "A Novel Hierarchical Secret Image Sharing Scheme with Multi-Group Joint Management". Mathematics 8, n.º 3 (19 de marzo de 2020): 448. http://dx.doi.org/10.3390/math8030448.
Texto completoP, Harshith, Kiran Kumar S R, KorniSesidhar Reddy, Srujan Reddy N y Jyothi M. "SECRET IMAGE SHARING AND IDENTIFYING FAKE IMAGE USING BLOCK CHAIN". International Research Journal of Computer Science 9, n.º 8 (13 de agosto de 2022): 262–66. http://dx.doi.org/10.26562/irjcs.2022.v0908.21.
Texto completoAhmed, Ali y Loay George. "Compression image sharing using DCT- Wavelet transform and coding by Blackely method". Iraqi Journal for Computers and Informatics 43, n.º 1 (30 de junio de 2017): 28–39. http://dx.doi.org/10.25195/ijci.v43i1.74.
Texto completoYang, Yu Guang y Hai Ping Chai. "A Trusted Multi-Party Authentication Scheme Based on Proactive-ElGamal Threshold Secret Sharing System". Applied Mechanics and Materials 235 (noviembre de 2012): 20–24. http://dx.doi.org/10.4028/www.scientific.net/amm.235.20.
Texto completoHosseini Beghaeiraveri, Seyed Amir, Mohammad Izadi y Mohsen Rezvani. "Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing". Security and Communication Networks 2020 (1 de agosto de 2020): 1–10. http://dx.doi.org/10.1155/2020/9428457.
Texto completoSankpal, Apurva, Adarsh Singh, Sanket Takalkar, Shubham Varma y Prof Ayesha Sayyed. "Data Concealment Using Steganography Technique". International Journal for Research in Applied Science and Engineering Technology 10, n.º 5 (31 de mayo de 2022): 5257–64. http://dx.doi.org/10.22214/ijraset.2022.43185.
Texto completoLee, Jae Hwan y Jong Hwan Park. "2-Subset Difference Broadcast Encryption System Based on Secret Sharing Method". Journal of Broadcast Engineering 20, n.º 4 (30 de julio de 2015): 580–97. http://dx.doi.org/10.5909/jbe.2015.20.4.580.
Texto completoLee, Jae Hwan y Jong Hwan Park. "A Transmission-Efficient Broadcast Encryption System Based on Secret Sharing Method". Journal of Broadcast Engineering 21, n.º 3 (30 de mayo de 2016): 412–24. http://dx.doi.org/10.5909/jbe.2016.21.3.412.
Texto completoMiyamoto, Toshiyuki y Takeshi Ikemura. "Subquery Allocation Problem and Heuristics for Secret Sharing Distributed Database System". Journal of Computer Systems, Networks, and Communications 2010 (2010): 1–6. http://dx.doi.org/10.1155/2010/984059.
Texto completoSulaiman, Eric Christiandi y Mariskha Tri Adithia. "THE VISUAL SECRET SHARING SCHEME BASED ON THE RGB COLOR SYSTEM". JUTI: Jurnal Ilmiah Teknologi Informasi 15, n.º 1 (1 de enero de 2017): 56. http://dx.doi.org/10.12962/j24068535.v15i1.a635.
Texto completoLi, Li, M. Shamim Hossain, Ahmed A. Abd El-Latif y M. F. Alhamid. "Distortion less secret image sharing scheme for Internet of Things system". Cluster Computing 22, S1 (30 de noviembre de 2017): 2293–307. http://dx.doi.org/10.1007/s10586-017-1345-y.
Texto completoSong, You-Jin, Seokmo Gu y Yei-Chang Kim. "A Study on the Distributed Transcoding System using Secret Sharing Techniques". Journal of Digital Convergence 12, n.º 11 (28 de noviembre de 2014): 233–39. http://dx.doi.org/10.14400/jdc.2014.12.11.233.
Texto completoLiu, Yuan, Licheng Wang, Xiaoying Shen, Lixiang Li y Dezhi An. "Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes". Security and Communication Networks 2020 (7 de agosto de 2020): 1–11. http://dx.doi.org/10.1155/2020/2345369.
Texto completoBezzateev, Sergey, Vadim Davydov y Aleksandr Ometov. "On Secret Sharing with Newton’s Polynomial for Multi-Factor Authentication". Cryptography 4, n.º 4 (1 de diciembre de 2020): 34. http://dx.doi.org/10.3390/cryptography4040034.
Texto completoCree, Joy y Alex May. "Code-routing: a new attack on position verification". Quantum 7 (9 de agosto de 2023): 1079. http://dx.doi.org/10.22331/q-2023-08-09-1079.
Texto completo