Artykuły w czasopismach na temat „Leakage resilient secret sharing”
Utwórz poprawne odniesienie w stylach APA, MLA, Chicago, Harvard i wielu innych
Sprawdź 50 najlepszych artykułów w czasopismach naukowych na temat „Leakage resilient secret sharing”.
Przycisk „Dodaj do bibliografii” jest dostępny obok każdej pracy w bibliografii. Użyj go – a my automatycznie utworzymy odniesienie bibliograficzne do wybranej pracy w stylu cytowania, którego potrzebujesz: APA, MLA, Harvard, Chicago, Vancouver itp.
Możesz również pobrać pełny tekst publikacji naukowej w formacie „.pdf” i przeczytać adnotację do pracy online, jeśli odpowiednie parametry są dostępne w metadanych.
Przeglądaj artykuły w czasopismach z różnych dziedzin i twórz odpowiednie bibliografie.
Dai, ShuGuang, JinFeng Wei i FangGuo Zhang. "Memory leakage-resilient secret sharing schemes". Science China Information Sciences 58, nr 11 (23.09.2015): 1–9. http://dx.doi.org/10.1007/s11432-015-5385-8.
Pełny tekst źródłaLi, Ping, Shengjun Li, Hongyang Yan, Lishan Ke, Teng Huang i Alzubair Hassan. "A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme". Complexity 2020 (13.03.2020): 1–13. http://dx.doi.org/10.1155/2020/1784276.
Pełny tekst źródłaLabao, Alfonso, i Henry Adorna. "Cryptographic Rational Secret Sharing Schemes over General Networks". Cryptography 6, nr 4 (1.10.2022): 50. http://dx.doi.org/10.3390/cryptography6040050.
Pełny tekst źródłaMaitra, Arpita, i Goutam Paul. "A Resilient Quantum Secret Sharing Scheme". International Journal of Theoretical Physics 54, nr 2 (26.06.2014): 398–408. http://dx.doi.org/10.1007/s10773-014-2233-3.
Pełny tekst źródłaZhou, Yanwei, Bo Yang, Tao Wang, Zhe Xia i Hongxia Hou. "Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings". Computer Journal 63, nr 4 (13.11.2019): 508–24. http://dx.doi.org/10.1093/comjnl/bxz085.
Pełny tekst źródłaGuo, Yuyan, Jiguo Li, Mingming Jiang, Lei Yu i Shimin Wei. "Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model". Security and Communication Networks 2020 (28.06.2020): 1–11. http://dx.doi.org/10.1155/2020/1492681.
Pełny tekst źródłaHuang, Jianye, Qiong Huang i Chunhua Pan. "A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting". International Journal of Foundations of Computer Science 28, nr 06 (wrzesień 2017): 761–80. http://dx.doi.org/10.1142/s0129054117400172.
Pełny tekst źródłaTang, Fei, Hongda Li, Qihua Niu i Bei Liang. "Secure Mobile Agent from Leakage-Resilient Proxy Signatures". Mobile Information Systems 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/901418.
Pełny tekst źródłaZhang, Yinghui, Pengzhen Lang, Dong Zheng, Menglei Yang i Rui Guo. "A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience". Security and Communication Networks 2018 (24.06.2018): 1–13. http://dx.doi.org/10.1155/2018/7202598.
Pełny tekst źródłaTseng, Yuh–Min, Jui-Di Wu, Sen-Shan Huang i Tung-Tso Tsai. "Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server". Information Technology And Control 49, nr 4 (19.12.2020): 464–81. http://dx.doi.org/10.5755/j01.itc.49.4.25927.
Pełny tekst źródłaWu, Zhen, Yining Liu i Xingxing Jia. "A Novel Hierarchical Secret Image Sharing Scheme with Multi-Group Joint Management". Mathematics 8, nr 3 (19.03.2020): 448. http://dx.doi.org/10.3390/math8030448.
Pełny tekst źródłaZhang, Xiujie, Xingbing Fu, Lu Hong, Yu Liu i Liangliang Wang. "Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network". International Journal of Distributed Sensor Networks 16, nr 6 (czerwiec 2020): 155014772092873. http://dx.doi.org/10.1177/1550147720928733.
Pełny tekst źródłaZhao, Xuemei, Tongtong Zhang, Jun Liu, Canju Lu, Huan Lu i Xuehu Yan. "Applying Secret Image Sharing to Economics". International Journal of Digital Crime and Forensics 13, nr 4 (lipiec 2021): 16–25. http://dx.doi.org/10.4018/ijdcf.20210701.oa2.
Pełny tekst źródłaQihong Yu, Qihong Yu, Jian Shen Qihong Yu, Jin-Feng Lai Jian Shen i Sai Ji Jin-Feng Lai. "Continuous Leakage-resilient and Hierarchical Identity-based Online/Offline Encryption". 網際網路技術學刊 23, nr 6 (listopad 2022): 1287–96. http://dx.doi.org/10.53106/160792642022112306011.
Pełny tekst źródłaZhang, Yinghui, Menglei Yang, Dong Zheng, Tiantian Zhang, Rui Guo i Fang Ren. "Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity". International Journal of Foundations of Computer Science 30, nr 04 (czerwiec 2019): 665–81. http://dx.doi.org/10.1142/s0129054119400197.
Pełny tekst źródłaLabao, Alfonso, i Henry Adorna. "A CCA-PKE Secure-Cryptosystem Resilient to Randomness Reset and Secret-Key Leakage". Cryptography 6, nr 1 (4.01.2022): 2. http://dx.doi.org/10.3390/cryptography6010002.
Pełny tekst źródłaChen, Xiu-Bo, Gang Xu, Yuan Su i Yi-Xian Yang. "Robust variations of secret sharing through noisy quantum channel". Quantum Information and Computation 14, nr 7&8 (maj 2014): 589–607. http://dx.doi.org/10.26421/qic14.7-8-4.
Pełny tekst źródłaZhang, En, Peiyan Yuan i Jiao Du. "Verifiable Rational Secret Sharing Scheme in Mobile Networks". Mobile Information Systems 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/462345.
Pełny tekst źródłaZhenhua Tan, Danke Wu, Hong Li, Tianhan Gao i Nan Guo. "Hierarchical Threshold Secret Image Sharing Scheme Based on Birkhoff Interpolation and Matrix Projection". Research Briefs on Information and Communication Technology Evolution 4 (15.10.2018): 125–33. http://dx.doi.org/10.56801/rebicte.v4i.73.
Pełny tekst źródłaZhang, Li-na, Jia-qi Sun, Xiao-yu Zhang, Qing-peng Chen i Jing Zhang. "Two-level QR code scheme based on region matrix image secret sharing algorithm". Mathematical Biosciences and Engineering 20, nr 9 (2023): 16678–704. http://dx.doi.org/10.3934/mbe.2023743.
Pełny tekst źródłaAlawatugoda, Janaka. "Public-Key Encryption In The Standard Model Against Strong Leakage Adversary". Computer Journal 63, nr 12 (3.06.2020): 1904–14. http://dx.doi.org/10.1093/comjnl/bxaa055.
Pełny tekst źródłaSharma, Shantanu, Yin Li, Sharad Mehrotra, Nisha Panwar, Komal Kumari i Swagnik Roychoudhury. "Information-Theoretically Secure and Highly Efficient Search and Row Retrieval". Proceedings of the VLDB Endowment 16, nr 10 (czerwiec 2023): 2391–403. http://dx.doi.org/10.14778/3603581.3603582.
Pełny tekst źródłaLiu, Yuan, Licheng Wang, Xiaoying Shen, Lixiang Li i Dezhi An. "Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes". Security and Communication Networks 2020 (7.08.2020): 1–11. http://dx.doi.org/10.1155/2020/2345369.
Pełny tekst źródłaBras-Amorós. "Ideals of Numerical Semigroups and Error-Correcting Codes". Symmetry 11, nr 11 (14.11.2019): 1406. http://dx.doi.org/10.3390/sym11111406.
Pełny tekst źródłaYu, Qihong, Jiguo Li i Sai Ji. "Hierarchical Identity-Based Online/Offline Encryption Scheme with Leakage Resilience". Security and Communication Networks 2022 (30.11.2022): 1–11. http://dx.doi.org/10.1155/2022/6849761.
Pełny tekst źródłaXU, JUAN, HANWU CHEN i ZHIHAO LIU. "A SIMPLE AND SECURE QUANTUM SECRET SHARING SCHEME BASED ON PRODUCT STATES". International Journal of Quantum Information 10, nr 03 (kwiecień 2012): 1250031. http://dx.doi.org/10.1142/s0219749912500311.
Pełny tekst źródłaR, Nesamalar, i Dr Ravikumar K. "Proficient and Safe Token with Secret and Public Keys Sharing Algorithm for Preventing Cryptographic Key Leakage in Wireless Sensor Network". International Journal of Engineering Research in Electronics and Communication Engineering 9, nr 9 (30.08.2022): 1–6. http://dx.doi.org/10.36647/ijerece/09.09.a001.
Pełny tekst źródłaPrabhu, Mr S., Veeramani P, Santhosh kumar C i Vijay M. "Watermarking and Encryption Technique to Avoid Data Leakage Based on Block Chain". International Journal for Research in Applied Science and Engineering Technology 11, nr 5 (31.05.2023): 867–71. http://dx.doi.org/10.22214/ijraset.2023.51633.
Pełny tekst źródłaZhao, Yi, Kaitai Liang, Bo Yang i Liqun Chen. "CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs". Security and Communication Networks 2019 (31.10.2019): 1–8. http://dx.doi.org/10.1155/2019/8357241.
Pełny tekst źródłaChhabra, Sakshi, i Ashutosh Kumar Singh. "Security Enhancement in Cloud Environment using Secure Secret Key Sharing". Journal of communications software and systems 16, nr 4 (20.07.2020): 296–307. http://dx.doi.org/10.24138/jcomss.v16i3.964.
Pełny tekst źródłaPavlov, Maksym, i Iryna Yurchak. "Software Implementation of Modified LSB Algorithm with Shamir`s Secret Sharing". Advances in Cyber-Physical Systems 7, nr 2 (16.12.2022): 130–39. http://dx.doi.org/10.23939/acps2022.02.130.
Pełny tekst źródłaQin, Su-Juan, i Feng Liu. "Information Leakage in Quantum Secret Sharing of Multi-Bits by an Entangled Six-Qubit State". International Journal of Theoretical Physics 53, nr 9 (16.04.2014): 3116–23. http://dx.doi.org/10.1007/s10773-014-2108-7.
Pełny tekst źródłaFeng, Tao, Dewei Wang i Renbin Gong. "A Blockchain-Based Efficient and Verifiable Attribute-Based Proxy Re-Encryption Cloud Sharing Scheme". Information 14, nr 5 (9.05.2023): 281. http://dx.doi.org/10.3390/info14050281.
Pełny tekst źródłaZhang, Lina, Tong Wang, Xiangqin Zheng, Junhan Yang i Liping Lv. "Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things". Security and Communication Networks 2021 (12.11.2021): 1–12. http://dx.doi.org/10.1155/2021/1721925.
Pełny tekst źródłaHwang, Yong-Woon, Su-Hyun Kim, Daehee Seo i Im-Yeong Lee. "An SKP-ABE Scheme for Secure and Efficient Data Sharing in Cloud Environments". Wireless Communications and Mobile Computing 2022 (17.06.2022): 1–18. http://dx.doi.org/10.1155/2022/1384405.
Pełny tekst źródłaBhagat, Payal, i Amar Buchade. "A Survey on Leakage-Resilient KASE for Group Data Sharing with Auxiliary Input via Cloud Storage". IJARCCE 6, nr 4 (30.04.2017): 95–98. http://dx.doi.org/10.17148/ijarcce.2017.6419.
Pełny tekst źródłaLiu, Chenlei, Feng Xiang i Zhixin Sun. "Multiauthority Attribute-Based Access Control for Supply Chain Information Sharing in Blockchain". Security and Communication Networks 2022 (12.04.2022): 1–18. http://dx.doi.org/10.1155/2022/8497628.
Pełny tekst źródłaLi, Zhenfei, Malin Premaratne i Weiren Zhu. "Advanced encryption method realized by secret shared phase encoding scheme using a multi-wavelength metasurface". Nanophotonics 9, nr 11 (4.07.2020): 3687–96. http://dx.doi.org/10.1515/nanoph-2020-0298.
Pełny tekst źródłaZhang, Wenbo, Jing Zhang, Yifei Shi i Jingyu Feng. "UIV-TSP: A Blockchain-Enabled Antileakage Sharing Protection Scheme for Undisclosed IIoT Vulnerabilities". Security and Communication Networks 2022 (10.10.2022): 1–17. http://dx.doi.org/10.1155/2022/2500213.
Pełny tekst źródłaKu-Cauich, Juan Carlos, i Guillermo Morales-Luna. "A linear code based on resilient Boolean maps whose dual is a platform for a robust secret sharing scheme". Linear Algebra and its Applications 596 (lipiec 2020): 216–29. http://dx.doi.org/10.1016/j.laa.2020.03.010.
Pełny tekst źródłaSona, G., P. Annapandi i Boopathy Yamni. "Inscribing in to an Control Attempt against Jammer Attack Using FB Decoding Mechanism". Applied Mechanics and Materials 573 (czerwiec 2014): 412–17. http://dx.doi.org/10.4028/www.scientific.net/amm.573.412.
Pełny tekst źródłaPeeters, Roel, Dave Singelée i Bart Preneel. "Threshold-Based Location-Aware Access Control". International Journal of Handheld Computing Research 2, nr 3 (lipiec 2011): 22–37. http://dx.doi.org/10.4018/jhcr.2011070102.
Pełny tekst źródłaLong, Jing, Dafang Zhang, Wei Liang i Xia'an Bi. "Signature Restoration for Enhancing Robustness of FPGA IP Designs". International Journal of Information Security and Privacy 9, nr 3 (lipiec 2015): 41–56. http://dx.doi.org/10.4018/ijisp.2015070103.
Pełny tekst źródłaMa, Chunguang, Juyan Li i Weiping Ouyang. "Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment". International Journal of Foundations of Computer Science 28, nr 06 (wrzesień 2017): 645–60. http://dx.doi.org/10.1142/s0129054117400111.
Pełny tekst źródłaDamgård, Ivan, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter i Michael Bæksvang Østergaard. "Fast threshold ECDSA with honest majority1". Journal of Computer Security 30, nr 1 (20.01.2022): 167–96. http://dx.doi.org/10.3233/jcs-200112.
Pełny tekst źródłaPasserini, Federico, i Andrea M. Tonello. "Secure PHY Layer Key Generation in the Asymmetric Power Line Communication Channel". Electronics 9, nr 4 (2.04.2020): 605. http://dx.doi.org/10.3390/electronics9040605.
Pełny tekst źródłaZhang, Denghui, Lijing Ren, Muhammad Shafiq i Zhaoquan Gu. "A Privacy Protection Framework for Medical Image Security without Key Dependency Based on Visual Cryptography and Trusted Computing". Computational Intelligence and Neuroscience 2023 (31.01.2023): 1–11. http://dx.doi.org/10.1155/2023/6758406.
Pełny tekst źródłaZhang, Lizhe, Zhenghang You, Kenian Wang i Zihan Cui. "Research on Access Control Scheme of System Wide Information Management Based on Attribute Association". Security and Communication Networks 2022 (30.05.2022): 1–15. http://dx.doi.org/10.1155/2022/6181995.
Pełny tekst źródłaLavanya, D. L., R. Ramaprabha i K. Gunaseelan. "Privacy Preserving Physical Layer Authentication Scheme for LBS based Wireless Networks". Defence Science Journal 71, nr 2 (10.03.2021): 241–47. http://dx.doi.org/10.14429/dsj.71.15355.
Pełny tekst źródłaMing, Yang, i Tingting Zhang. "Efficient Privacy-Preserving Access Control Scheme in Electronic Health Records System". Sensors 18, nr 10 (18.10.2018): 3520. http://dx.doi.org/10.3390/s18103520.
Pełny tekst źródła