Статті в журналах з теми "Leakage resilient secret sharing"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Leakage resilient secret sharing".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Dai, ShuGuang, JinFeng Wei, and FangGuo Zhang. "Memory leakage-resilient secret sharing schemes." Science China Information Sciences 58, no. 11 (September 23, 2015): 1–9. http://dx.doi.org/10.1007/s11432-015-5385-8.
Повний текст джерелаLi, Ping, Shengjun Li, Hongyang Yan, Lishan Ke, Teng Huang, and Alzubair Hassan. "A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme." Complexity 2020 (March 13, 2020): 1–13. http://dx.doi.org/10.1155/2020/1784276.
Повний текст джерелаLabao, Alfonso, and Henry Adorna. "Cryptographic Rational Secret Sharing Schemes over General Networks." Cryptography 6, no. 4 (October 1, 2022): 50. http://dx.doi.org/10.3390/cryptography6040050.
Повний текст джерелаMaitra, Arpita, and Goutam Paul. "A Resilient Quantum Secret Sharing Scheme." International Journal of Theoretical Physics 54, no. 2 (June 26, 2014): 398–408. http://dx.doi.org/10.1007/s10773-014-2233-3.
Повний текст джерелаZhou, Yanwei, Bo Yang, Tao Wang, Zhe Xia, and Hongxia Hou. "Continuous Leakage-Resilient Certificate-Based Encryption Scheme Without Bilinear Pairings." Computer Journal 63, no. 4 (November 13, 2019): 508–24. http://dx.doi.org/10.1093/comjnl/bxz085.
Повний текст джерелаGuo, Yuyan, Jiguo Li, Mingming Jiang, Lei Yu, and Shimin Wei. "Certificate-Based Encryption Resilient to Continual Leakage in the Standard Model." Security and Communication Networks 2020 (June 28, 2020): 1–11. http://dx.doi.org/10.1155/2020/1492681.
Повний текст джерелаHuang, Jianye, Qiong Huang, and Chunhua Pan. "A Black-Box Construction of Strongly Unforgeable Signature Scheme in the Leakage Setting." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 761–80. http://dx.doi.org/10.1142/s0129054117400172.
Повний текст джерелаTang, Fei, Hongda Li, Qihua Niu, and Bei Liang. "Secure Mobile Agent from Leakage-Resilient Proxy Signatures." Mobile Information Systems 2015 (2015): 1–12. http://dx.doi.org/10.1155/2015/901418.
Повний текст джерелаZhang, Yinghui, Pengzhen Lang, Dong Zheng, Menglei Yang, and Rui Guo. "A Secure and Privacy-Aware Smart Health System with Secret Key Leakage Resilience." Security and Communication Networks 2018 (June 24, 2018): 1–13. http://dx.doi.org/10.1155/2018/7202598.
Повний текст джерелаTseng, Yuh–Min, Jui-Di Wu, Sen-Shan Huang, and Tung-Tso Tsai. "Leakage-Resilient Outsourced Revocable Certificateless Signature with a Cloud Revocation Server." Information Technology And Control 49, no. 4 (December 19, 2020): 464–81. http://dx.doi.org/10.5755/j01.itc.49.4.25927.
Повний текст джерелаWu, Zhen, Yining Liu, and Xingxing Jia. "A Novel Hierarchical Secret Image Sharing Scheme with Multi-Group Joint Management." Mathematics 8, no. 3 (March 19, 2020): 448. http://dx.doi.org/10.3390/math8030448.
Повний текст джерелаZhang, Xiujie, Xingbing Fu, Lu Hong, Yu Liu, and Liangliang Wang. "Provable secure identity-based online/offline encryption scheme with continual leakage resilience for wireless sensor network." International Journal of Distributed Sensor Networks 16, no. 6 (June 2020): 155014772092873. http://dx.doi.org/10.1177/1550147720928733.
Повний текст джерелаZhao, Xuemei, Tongtong Zhang, Jun Liu, Canju Lu, Huan Lu, and Xuehu Yan. "Applying Secret Image Sharing to Economics." International Journal of Digital Crime and Forensics 13, no. 4 (July 2021): 16–25. http://dx.doi.org/10.4018/ijdcf.20210701.oa2.
Повний текст джерелаQihong Yu, Qihong Yu, Jian Shen Qihong Yu, Jin-Feng Lai Jian Shen, and Sai Ji Jin-Feng Lai. "Continuous Leakage-resilient and Hierarchical Identity-based Online/Offline Encryption." 網際網路技術學刊 23, no. 6 (November 2022): 1287–96. http://dx.doi.org/10.53106/160792642022112306011.
Повний текст джерелаZhang, Yinghui, Menglei Yang, Dong Zheng, Tiantian Zhang, Rui Guo, and Fang Ren. "Leakage-Resilient Hierarchical Identity-Based Encryption with Recipient Anonymity." International Journal of Foundations of Computer Science 30, no. 04 (June 2019): 665–81. http://dx.doi.org/10.1142/s0129054119400197.
Повний текст джерелаLabao, Alfonso, and Henry Adorna. "A CCA-PKE Secure-Cryptosystem Resilient to Randomness Reset and Secret-Key Leakage." Cryptography 6, no. 1 (January 4, 2022): 2. http://dx.doi.org/10.3390/cryptography6010002.
Повний текст джерелаChen, Xiu-Bo, Gang Xu, Yuan Su, and Yi-Xian Yang. "Robust variations of secret sharing through noisy quantum channel." Quantum Information and Computation 14, no. 7&8 (May 2014): 589–607. http://dx.doi.org/10.26421/qic14.7-8-4.
Повний текст джерелаZhang, En, Peiyan Yuan, and Jiao Du. "Verifiable Rational Secret Sharing Scheme in Mobile Networks." Mobile Information Systems 2015 (2015): 1–7. http://dx.doi.org/10.1155/2015/462345.
Повний текст джерелаZhenhua Tan, Danke Wu, Hong Li, Tianhan Gao, and Nan Guo. "Hierarchical Threshold Secret Image Sharing Scheme Based on Birkhoff Interpolation and Matrix Projection." Research Briefs on Information and Communication Technology Evolution 4 (October 15, 2018): 125–33. http://dx.doi.org/10.56801/rebicte.v4i.73.
Повний текст джерелаZhang, Li-na, Jia-qi Sun, Xiao-yu Zhang, Qing-peng Chen, and Jing Zhang. "Two-level QR code scheme based on region matrix image secret sharing algorithm." Mathematical Biosciences and Engineering 20, no. 9 (2023): 16678–704. http://dx.doi.org/10.3934/mbe.2023743.
Повний текст джерелаAlawatugoda, Janaka. "Public-Key Encryption In The Standard Model Against Strong Leakage Adversary." Computer Journal 63, no. 12 (June 3, 2020): 1904–14. http://dx.doi.org/10.1093/comjnl/bxaa055.
Повний текст джерелаSharma, Shantanu, Yin Li, Sharad Mehrotra, Nisha Panwar, Komal Kumari, and Swagnik Roychoudhury. "Information-Theoretically Secure and Highly Efficient Search and Row Retrieval." Proceedings of the VLDB Endowment 16, no. 10 (June 2023): 2391–403. http://dx.doi.org/10.14778/3603581.3603582.
Повний текст джерелаLiu, Yuan, Licheng Wang, Xiaoying Shen, Lixiang Li, and Dezhi An. "Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes." Security and Communication Networks 2020 (August 7, 2020): 1–11. http://dx.doi.org/10.1155/2020/2345369.
Повний текст джерелаBras-Amorós. "Ideals of Numerical Semigroups and Error-Correcting Codes." Symmetry 11, no. 11 (November 14, 2019): 1406. http://dx.doi.org/10.3390/sym11111406.
Повний текст джерелаYu, Qihong, Jiguo Li, and Sai Ji. "Hierarchical Identity-Based Online/Offline Encryption Scheme with Leakage Resilience." Security and Communication Networks 2022 (November 30, 2022): 1–11. http://dx.doi.org/10.1155/2022/6849761.
Повний текст джерелаXU, JUAN, HANWU CHEN, and ZHIHAO LIU. "A SIMPLE AND SECURE QUANTUM SECRET SHARING SCHEME BASED ON PRODUCT STATES." International Journal of Quantum Information 10, no. 03 (April 2012): 1250031. http://dx.doi.org/10.1142/s0219749912500311.
Повний текст джерелаR, Nesamalar, and Dr Ravikumar K. "Proficient and Safe Token with Secret and Public Keys Sharing Algorithm for Preventing Cryptographic Key Leakage in Wireless Sensor Network." International Journal of Engineering Research in Electronics and Communication Engineering 9, no. 9 (August 30, 2022): 1–6. http://dx.doi.org/10.36647/ijerece/09.09.a001.
Повний текст джерелаPrabhu, Mr S., Veeramani P, Santhosh kumar C, and Vijay M. "Watermarking and Encryption Technique to Avoid Data Leakage Based on Block Chain." International Journal for Research in Applied Science and Engineering Technology 11, no. 5 (May 31, 2023): 867–71. http://dx.doi.org/10.22214/ijraset.2023.51633.
Повний текст джерелаZhao, Yi, Kaitai Liang, Bo Yang, and Liqun Chen. "CCA Secure Public Key Encryption against After-the-Fact Leakage without NIZK Proofs." Security and Communication Networks 2019 (October 31, 2019): 1–8. http://dx.doi.org/10.1155/2019/8357241.
Повний текст джерелаChhabra, Sakshi, and Ashutosh Kumar Singh. "Security Enhancement in Cloud Environment using Secure Secret Key Sharing." Journal of communications software and systems 16, no. 4 (July 20, 2020): 296–307. http://dx.doi.org/10.24138/jcomss.v16i3.964.
Повний текст джерелаPavlov, Maksym, and Iryna Yurchak. "Software Implementation of Modified LSB Algorithm with Shamir`s Secret Sharing." Advances in Cyber-Physical Systems 7, no. 2 (December 16, 2022): 130–39. http://dx.doi.org/10.23939/acps2022.02.130.
Повний текст джерелаQin, Su-Juan, and Feng Liu. "Information Leakage in Quantum Secret Sharing of Multi-Bits by an Entangled Six-Qubit State." International Journal of Theoretical Physics 53, no. 9 (April 16, 2014): 3116–23. http://dx.doi.org/10.1007/s10773-014-2108-7.
Повний текст джерелаFeng, Tao, Dewei Wang, and Renbin Gong. "A Blockchain-Based Efficient and Verifiable Attribute-Based Proxy Re-Encryption Cloud Sharing Scheme." Information 14, no. 5 (May 9, 2023): 281. http://dx.doi.org/10.3390/info14050281.
Повний текст джерелаZhang, Lina, Tong Wang, Xiangqin Zheng, Junhan Yang, and Liping Lv. "Secret Image-Sharing Scheme Based on Multinode Authentication in the Internet of Things." Security and Communication Networks 2021 (November 12, 2021): 1–12. http://dx.doi.org/10.1155/2021/1721925.
Повний текст джерелаHwang, Yong-Woon, Su-Hyun Kim, Daehee Seo, and Im-Yeong Lee. "An SKP-ABE Scheme for Secure and Efficient Data Sharing in Cloud Environments." Wireless Communications and Mobile Computing 2022 (June 17, 2022): 1–18. http://dx.doi.org/10.1155/2022/1384405.
Повний текст джерелаBhagat, Payal, and Amar Buchade. "A Survey on Leakage-Resilient KASE for Group Data Sharing with Auxiliary Input via Cloud Storage." IJARCCE 6, no. 4 (April 30, 2017): 95–98. http://dx.doi.org/10.17148/ijarcce.2017.6419.
Повний текст джерелаLiu, Chenlei, Feng Xiang, and Zhixin Sun. "Multiauthority Attribute-Based Access Control for Supply Chain Information Sharing in Blockchain." Security and Communication Networks 2022 (April 12, 2022): 1–18. http://dx.doi.org/10.1155/2022/8497628.
Повний текст джерелаLi, Zhenfei, Malin Premaratne, and Weiren Zhu. "Advanced encryption method realized by secret shared phase encoding scheme using a multi-wavelength metasurface." Nanophotonics 9, no. 11 (July 4, 2020): 3687–96. http://dx.doi.org/10.1515/nanoph-2020-0298.
Повний текст джерелаZhang, Wenbo, Jing Zhang, Yifei Shi, and Jingyu Feng. "UIV-TSP: A Blockchain-Enabled Antileakage Sharing Protection Scheme for Undisclosed IIoT Vulnerabilities." Security and Communication Networks 2022 (October 10, 2022): 1–17. http://dx.doi.org/10.1155/2022/2500213.
Повний текст джерелаKu-Cauich, Juan Carlos, and Guillermo Morales-Luna. "A linear code based on resilient Boolean maps whose dual is a platform for a robust secret sharing scheme." Linear Algebra and its Applications 596 (July 2020): 216–29. http://dx.doi.org/10.1016/j.laa.2020.03.010.
Повний текст джерелаSona, G., P. Annapandi, and Boopathy Yamni. "Inscribing in to an Control Attempt against Jammer Attack Using FB Decoding Mechanism." Applied Mechanics and Materials 573 (June 2014): 412–17. http://dx.doi.org/10.4028/www.scientific.net/amm.573.412.
Повний текст джерелаPeeters, Roel, Dave Singelée, and Bart Preneel. "Threshold-Based Location-Aware Access Control." International Journal of Handheld Computing Research 2, no. 3 (July 2011): 22–37. http://dx.doi.org/10.4018/jhcr.2011070102.
Повний текст джерелаLong, Jing, Dafang Zhang, Wei Liang, and Xia'an Bi. "Signature Restoration for Enhancing Robustness of FPGA IP Designs." International Journal of Information Security and Privacy 9, no. 3 (July 2015): 41–56. http://dx.doi.org/10.4018/ijisp.2015070103.
Повний текст джерелаMa, Chunguang, Juyan Li, and Weiping Ouyang. "Lattice-Based Identity-Based Homomorphic Conditional Proxy Re-Encryption for Secure Big Data Computing in Cloud Environment." International Journal of Foundations of Computer Science 28, no. 06 (September 2017): 645–60. http://dx.doi.org/10.1142/s0129054117400111.
Повний текст джерелаDamgård, Ivan, Thomas P. Jakobsen, Jesper Buus Nielsen, Jakob Illeborg Pagter, and Michael Bæksvang Østergaard. "Fast threshold ECDSA with honest majority1." Journal of Computer Security 30, no. 1 (January 20, 2022): 167–96. http://dx.doi.org/10.3233/jcs-200112.
Повний текст джерелаPasserini, Federico, and Andrea M. Tonello. "Secure PHY Layer Key Generation in the Asymmetric Power Line Communication Channel." Electronics 9, no. 4 (April 2, 2020): 605. http://dx.doi.org/10.3390/electronics9040605.
Повний текст джерелаZhang, Denghui, Lijing Ren, Muhammad Shafiq, and Zhaoquan Gu. "A Privacy Protection Framework for Medical Image Security without Key Dependency Based on Visual Cryptography and Trusted Computing." Computational Intelligence and Neuroscience 2023 (January 31, 2023): 1–11. http://dx.doi.org/10.1155/2023/6758406.
Повний текст джерелаZhang, Lizhe, Zhenghang You, Kenian Wang, and Zihan Cui. "Research on Access Control Scheme of System Wide Information Management Based on Attribute Association." Security and Communication Networks 2022 (May 30, 2022): 1–15. http://dx.doi.org/10.1155/2022/6181995.
Повний текст джерелаLavanya, D. L., R. Ramaprabha, and K. Gunaseelan. "Privacy Preserving Physical Layer Authentication Scheme for LBS based Wireless Networks." Defence Science Journal 71, no. 2 (March 10, 2021): 241–47. http://dx.doi.org/10.14429/dsj.71.15355.
Повний текст джерелаMing, Yang, and Tingting Zhang. "Efficient Privacy-Preserving Access Control Scheme in Electronic Health Records System." Sensors 18, no. 10 (October 18, 2018): 3520. http://dx.doi.org/10.3390/s18103520.
Повний текст джерела