Gotowa bibliografia na temat „Leakage resilient secret sharing”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Zobacz listy aktualnych artykułów, książek, rozpraw, streszczeń i innych źródeł naukowych na temat „Leakage resilient secret sharing”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Artykuły w czasopismach na temat "Leakage resilient secret sharing"
Dai, ShuGuang, JinFeng Wei i FangGuo Zhang. "Memory leakage-resilient secret sharing schemes". Science China Information Sciences 58, nr 11 (23.09.2015): 1–9. http://dx.doi.org/10.1007/s11432-015-5385-8.
Pełny tekst źródłaLi, Ping, Shengjun Li, Hongyang Yan, Lishan Ke, Teng Huang i Alzubair Hassan. "A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme". Complexity 2020 (13.03.2020): 1–13. http://dx.doi.org/10.1155/2020/1784276.
Pełny tekst źródłaLabao, Alfonso, i Henry Adorna. "Cryptographic Rational Secret Sharing Schemes over General Networks". Cryptography 6, nr 4 (1.10.2022): 50. http://dx.doi.org/10.3390/cryptography6040050.
Pełny tekst źródłaMaitra, Arpita, i Goutam Paul. "A Resilient Quantum Secret Sharing Scheme". International Journal of Theoretical Physics 54, nr 2 (26.06.2014): 398–408. http://dx.doi.org/10.1007/s10773-014-2233-3.
Pełny tekst źródłaZhou, Yanwei, Bo Yang, Tao Wang, Zhe Xia i Hongxia Hou. "Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings". Computer Journal 63, nr 4 (13.11.2019): 508–24. http://dx.doi.org/10.1093/comjnl/bxz085.
Pełny tekst źródłaGuo, Yuyan, Jiguo Li, Mingming Jiang, Lei Yu i Shimin Wei. "Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model". Security and Communication Networks 2020 (28.06.2020): 1–11. http://dx.doi.org/10.1155/2020/1492681.
Pełny tekst źródłaHuang, Jianye, Qiong Huang i Chunhua Pan. "A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting". International Journal of Foundations of Computer Science 28, nr 06 (wrzesień 2017): 761–80. http://dx.doi.org/10.1142/s0129054117400172.
Pełny tekst źródłaTang, Fei, Hongda Li, Qihua Niu i Bei Liang. "Secure Mobile Agent from Leakage-Resilient Proxy Signatures". Mobile Information Systems 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/901418.
Pełny tekst źródłaZhang, Yinghui, Pengzhen Lang, Dong Zheng, Menglei Yang i Rui Guo. "A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience". Security and Communication Networks 2018 (24.06.2018): 1–13. http://dx.doi.org/10.1155/2018/7202598.
Pełny tekst źródłaTseng, Yuh–Min, Jui-Di Wu, Sen-Shan Huang i Tung-Tso Tsai. "Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server". Information Technology And Control 49, nr 4 (19.12.2020): 464–81. http://dx.doi.org/10.5755/j01.itc.49.4.25927.
Pełny tekst źródłaRozprawy doktorskie na temat "Leakage resilient secret sharing"
Chen, Guan-Wei, i 陳冠瑋. "Near Optimal Secret Sharing and Defense Resource Allocation Plans for QoS Constrained Information Leakage Minimization". Thesis, 2009. http://ndltd.ncl.edu.tw/handle/76650438020223405520.
Pełny tekst źródła國立臺灣大學
資訊管理學研究所
97
With the rapid prosperity of information systems and the Internet, most enterprises obtain competitive advantage by means of these information technologies. Hence, each enterprise uses the electronic equipment to store the sensitive information about core competence of the business. However, if the business secrets are leaked by opponents, it would lead to lose the competence and ruin their reputation for victims. For this reason, individuals or enterprises must protect the secrets from information leakage and ensure the availability for each legitimate user. As a result of the more criminal problems as time goes by, it becomes one of the important issues to develop effective defense strategies against information theft nowadays. In this thesis, we consider the network planning in the realm of the information security. The attack-defense scenario is formulated as the min-max mathematical model. In the inner problem, the attacker must allocate his/her limited attack budget to steal the sensitive information in order to cause maximal damage. In addition, the attacker could not reveal the secret unless he/she collects the enough number of shares and the corresponding decrypted key. On the other hand, in the outer problem, the network operator must construct the network topology and take account of the concept of defense-in-depth to design the most robust network. Furthermore, the combination of the secret sharing scheme and defense resource allocation strategy is applied for the sake of the confidentiality and availability. However, the attacker’s behavior is different from traditional attacks that he/she causes damage as soon as compromising nodes. Because of the consideration of the link malfunction, the network operator should not only guarantee the reliability of the network transmission but also satisfy the Quality-of-Service for legitimate users. The Lagrangean Relaxation-based algorithm and the subgradient-based algorithm are proposed to solve the two layer mathematical problem. Beside, we further formulate the independent single layer model for the initial network deployment problem and define the “Discrete Degree” metric to represent the impact of the attacker. The Simulated Annealing-based algorithm is applied to handle this problem. Finally, we evaluate the efficiency and effectiveness of the proposed algorithms by computational experiments.
Chen, Ding-Jie, i 陳鼎介. "An RST-Resilient Image Intellectual Property Protection Scheme Based on Fourier-Mellin Transform and Secret Sharing". Thesis, 2006. http://ndltd.ncl.edu.tw/handle/13834369141719003666.
Pełny tekst źródła大同大學
資訊工程學系(所)
94
In many watermarking systems, the main principle to retrieve the watermark is based on the knowledge of the positions for embedding the watermark. However, the geometric distortions rearrange the watermark embedding positions, and this often results in the failure of the watermark retrieval. In this thesis, the proposed scheme aims at resisting the rotation, scaling, and translation of the geometric distortions. The scheme contains a private share generation phase and a secret image retrieval phase. In the private share generation phase, the scheme employs the RST-invariant domain to obtain the feature share of the host image, and then generate the corresponding private share based on the secret sharing scheme for authentication. In the secret image retrieval phase, the feature share of the suspect image is retrieved from the RST-invariant domain, and then combined with the private share to regain the secret image for copyright authentication. The experimental results show that the scheme can withstand several attacks such as averaging, contrast adjustment, Gaussian blurring, JPEG compression, median filtering, Brightness-adjustment, sharpening, uniform noise adding, variance noise adding, slight affine transformation, slight pinching, slight punching, rescaling, lines removing, rotating, rotating with cropping, rotating with scaling, equalization, and print-and-scan.
Części książek na temat "Leakage resilient secret sharing"
Srinivasan, Akshayaram, i Prashant Nalini Vasudevan. "Leakage Resilient Secret Sharing and Applications". W Advances in Cryptology – CRYPTO 2019, 480–509. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-26951-7_17.
Pełny tekst źródłaNielsen, Jesper Buus, i Mark Simkin. "Lower Bounds for Leakage-Resilient Secret Sharing". W Advances in Cryptology – EUROCRYPT 2020, 556–77. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-45721-1_20.
Pełny tekst źródłaDutta, Sabyasachi, i Reihaneh Safavi-Naini. "Leakage Resilient Cheating Detectable Secret Sharing Schemes". W Information Security and Privacy, 3–23. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90567-5_1.
Pełny tekst źródłaMaji, Hemanta K., Anat Paskin-Cherniavsky, Tom Suad i Mingyuan Wang. "Constructing Locally Leakage-Resilient Linear Secret-Sharing Schemes". W Advances in Cryptology – CRYPTO 2021, 779–808. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-84252-9_26.
Pełny tekst źródłaMaji, Hemanta K., Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad, Mingyuan Wang, Xiuyu Ye i Albert Yu. "Leakage-resilient Linear Secret-sharing Against Arbitrary Bounded-size Leakage Family". W Theory of Cryptography, 355–83. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-22318-1_13.
Pełny tekst źródłaChandran, Nishanth, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu i Sruthi Sekar. "Short Leakage Resilient and Non-malleable Secret Sharing Schemes". W Advances in Cryptology – CRYPTO 2022, 178–207. Cham: Springer Nature Switzerland, 2022. http://dx.doi.org/10.1007/978-3-031-15802-5_7.
Pełny tekst źródłaLi, Ping, Jin Li i Alzubair Hassan. "Group Identification via Non-threshold Leakage-Resilient Secret Sharing Scheme". W Cyberspace Safety and Security, 234–41. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-37352-8_20.
Pełny tekst źródłaChandran, Nishanth, Bhavana Kanukurthi, Sai Lakshmi Bhavana Obbattu i Sruthi Sekar. "Adaptive Extractors and Their Application to Leakage Resilient Secret Sharing". W Advances in Cryptology – CRYPTO 2021, 595–624. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-84252-9_20.
Pełny tekst źródłaXiong, Hao, Cong Zhang, Tsz Hon Yuen, Echo P. Zhang, Siu Ming Yiu i Sihan Qing. "Continual Leakage-Resilient Dynamic Secret Sharing in the Split-State Model". W Information and Communications Security, 119–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34129-8_11.
Pełny tekst źródłaMaji, Hemanta K., Hai H. Nguyen, Anat Paskin-Cherniavsky, Tom Suad i Mingyuan Wang. "Leakage-Resilience of the Shamir Secret-Sharing Scheme Against Physical-Bit Leakages". W Lecture Notes in Computer Science, 344–74. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-77886-6_12.
Pełny tekst źródłaStreszczenia konferencji na temat "Leakage resilient secret sharing"
Kumar, Ashutosh, Raghu Meka i Amit Sahai. "Leakage-Resilient Secret Sharing Against Colluding Parties". W 2019 IEEE 60th Annual Symposium on Foundations of Computer Science (FOCS). IEEE, 2019. http://dx.doi.org/10.1109/focs.2019.00045.
Pełny tekst źródłaAdams, Donald Q., Hemanta K. Maji, Hai H. Nguyen, Minh L. Nguyen, Anat Paskin-Cherniavsky, Tom Suad i Mingyuan Wang. "Lower Bounds for Leakage-Resilient Secret-Sharing Schemes against Probing Attacks". W 2021 IEEE International Symposium on Information Theory (ISIT). IEEE, 2021. http://dx.doi.org/10.1109/isit45174.2021.9518230.
Pełny tekst źródłaMaji, Hemanta K., Hai H. Nguyen, Anat Paskin-Cherniavsky i Mingyuan Wang. "Improved Bound on the Local Leakage-resilience of Shamir’s Secret Sharing". W 2022 IEEE International Symposium on Information Theory (ISIT). IEEE, 2022. http://dx.doi.org/10.1109/isit50566.2022.9834695.
Pełny tekst źródłaDziembowski, Stefan, i Krzysztof Pietrzak. "Intrusion-Resilient Secret Sharing". W 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07). IEEE, 2007. http://dx.doi.org/10.1109/focs.2007.4389495.
Pełny tekst źródłaDziembowski, Stefan, i Krzysztof Pietrzak. "Intrusion-Resilient Secret Sharing". W 48th Annual IEEE Symposium on Foundations of Computer Science (FOCS'07). IEEE, 2007. http://dx.doi.org/10.1109/focs.2007.63.
Pełny tekst źródłaUkwandu, Elochukwu, William J. Buchanan, Lu Fan, Gordon Russell i Owen Lo. "RESCUE: Resilient Secret Sharing Cloud-Based Architecture". W 2015 IEEE Trustcom/BigDataSE/ISPA. IEEE, 2015. http://dx.doi.org/10.1109/trustcom.2015.459.
Pełny tekst źródłaJuarez-Sandoval, Oswaldo, Atoany Fierro-Radilla, Angelina Espejel-Trujillo, Mariko Nakano-Miyatake i Hector Perez-Meana. "Cropping and noise resilient steganography algorithm using secret image sharing". W Sixth International Conference on Graphic and Image Processing (ICGIP 2014), redaktorzy Yulin Wang, Xudong Jiang i David Zhang. SPIE, 2015. http://dx.doi.org/10.1117/12.2179745.
Pełny tekst źródłaLiu, Shenchuan, Masaaki Fujiyoshi i Hitoshi Kiya. "A leakage suppressed two-level security visual secret sharing scheme". W 2011 International Symposium on Intelligent Signal Processing and Communications Systems (ISPACS 2011). IEEE, 2011. http://dx.doi.org/10.1109/ispacs.2011.6146169.
Pełny tekst źródłaAlmeida, Jose Bacelar, Manuel Barbosa, Gilles Barthe, Hugo Pacheco, Vitor Pereira i Bernardo Portela. "Enforcing Ideal-World Leakage Bounds in Real-World Secret Sharing MPC Frameworks". W 2018 IEEE 31st Computer Security Foundations Symposium (CSF). IEEE, 2018. http://dx.doi.org/10.1109/csf.2018.00017.
Pełny tekst źródłaHsieh, Shang-Lin, Ding-Jie Chen, Bin-Yuan Huang i I.-Ju Tsai. "An RST-resilient image copyright protection scheme based on the invariant domain and image secret sharing". W 2008 IEEE International Conference on Systems, Man and Cybernetics (SMC). IEEE, 2008. http://dx.doi.org/10.1109/icsmc.2008.4811422.
Pełny tekst źródła