Статті в журналах з теми "MULTI SECRET SHARING SCHEME"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "MULTI SECRET SHARING SCHEME".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Endurthi, Anjaneyulu, Oinam B. Chanu, Appala N. Tentu, and V. Ch Venkaiah. "Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT." Journal of Communications Software and Systems 11, no. 1 (March 23, 2015): 15. http://dx.doi.org/10.24138/jcomss.v11i1.113.
Повний текст джерелаZHANG, EN, and YONGQUAN CAI. "RATIONAL MULTI-SECRET SHARING SCHEME IN STANDARD POINT-TO-POINT COMMUNICATION NETWORKS." International Journal of Foundations of Computer Science 24, no. 06 (September 2013): 879–97. http://dx.doi.org/10.1142/s012905411350024x.
Повний текст джерелаCai, Hongliang, and Dan Tang. "Multi Secret Image Sharing Scheme of General Access Structure with Meaningful Shares." Mathematics 8, no. 9 (September 14, 2020): 1582. http://dx.doi.org/10.3390/math8091582.
Повний текст джерелаJuan, Justie Su-Tzu, Jen-Yu Lin, Bo-Yuan Huang, and Yu-Chun Chung. "Advanced fault-tolerant visual multi-secret sharing scheme." Journal of Surveillance, Security and Safety 3 (2022): 41–54. http://dx.doi.org/10.20517/jsss.2021.29.
Повний текст джерелаLuo, Shuangshuang, Zhihui Li, Depeng Meng, and Jiansheng Guo. "Efficient quantum secret sharing scheme based on monotone span program." Laser Physics 33, no. 8 (June 22, 2023): 085201. http://dx.doi.org/10.1088/1555-6611/acd630.
Повний текст джерелаXu, Guoai, Jiangtao Yuan, Guosheng Xu, and Xingxing Jia. "A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier." Information Technology and Control 50, no. 2 (June 17, 2021): 236–46. http://dx.doi.org/10.5755/j01.itc.50.2.27789.
Повний текст джерелаChen, Chien-Chang, Cheng-Shian Lin, and Jia-Zhan Chen. "Boolean-Based (k, n, m) Multi-Secret Image Sharing." Axioms 11, no. 5 (April 23, 2022): 197. http://dx.doi.org/10.3390/axioms11050197.
Повний текст джерелаCsirmaz, Laszlo. "Secret sharing and duality." Journal of Mathematical Cryptology 15, no. 1 (November 25, 2020): 157–73. http://dx.doi.org/10.1515/jmc-2019-0045.
Повний текст джерелаChang, Joy, Bo-Yuan Huang, and Justie Juan. "A New Visual Multi-Secrets Sharing Scheme by Random Grids." Cryptography 2, no. 3 (September 17, 2018): 24. http://dx.doi.org/10.3390/cryptography2030024.
Повний текст джерелаHwang, Ren-Junn, and Chin-Chen Chang. "An on-line secret sharing scheme for multi-secrets." Computer Communications 21, no. 13 (September 1998): 1170–76. http://dx.doi.org/10.1016/s0140-3664(98)00191-1.
Повний текст джерелаChoudhary, Shipra PraveenKumar, Apeksha Katarni, Shweta Manjrekar, Mrs Vidyullata Devmane, and Mrs Vaishali Hirlekar. "Secret Sharing Approach in Multi-database System." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 6 (April 20, 2016): 6819–23. http://dx.doi.org/10.24297/ijct.v15i6.1606.
Повний текст джерелаQin, Hua Wang, Xiao Hua Zhu, and Yue Wei Dai. "A Secret Sharing Scheme on Access Structure." Applied Mechanics and Materials 571-572 (June 2014): 63–68. http://dx.doi.org/10.4028/www.scientific.net/amm.571-572.63.
Повний текст джерелаLin, Yan, Hongliang Zhu, Guoai Xu, and Guosheng Xu. "Hierarchical secret sharing scheme for WSN based on linear homogeneous recurrence relations." International Journal of Distributed Sensor Networks 18, no. 3 (March 2022): 155013292210887. http://dx.doi.org/10.1177/15501329221088740.
Повний текст джерелаEslamia, Khadijeh, and Mojtaba Bahramiana. "An isogeny-based quantum-resistant secret sharing scheme." Filomat 36, no. 10 (2022): 3249–58. http://dx.doi.org/10.2298/fil2210249e.
Повний текст джерелаMAO, Ying-ying, Ming MAO, and Yan-shuo ZHANG. "Verifiable hierarchical threshold multi-secret sharing scheme." Journal of Computer Applications 29, no. 1 (June 25, 2009): 172–74. http://dx.doi.org/10.3724/sp.j.1087.2009.00172.
Повний текст джерелаWANG, Wei, and Shun-xian ZHOU. "Multi-secret sharing scheme among weighted participants." Journal of Computer Applications 30, no. 12 (January 6, 2011): 3334–36. http://dx.doi.org/10.3724/sp.j.1087.2010.03334.
Повний текст джерелаWang, Jian, Yanheng Liu, and Yanxi Wang. "On Novel Verifiable Multi-Secret Sharing Scheme." Advanced Science Letters 4, no. 11 (November 1, 2011): 3709–15. http://dx.doi.org/10.1166/asl.2011.1259.
Повний текст джерелаYang, Chou-Chen, Ting-Yi Chang, and Min-Shiang Hwang. "A (t,n) multi-secret sharing scheme." Applied Mathematics and Computation 151, no. 2 (April 2004): 483–90. http://dx.doi.org/10.1016/s0096-3003(03)00355-2.
Повний текст джерелаMishra, Abhishek, and Ashutosh Gupta. "Multi secret sharing scheme using iterative method." Journal of Information and Optimization Sciences 39, no. 3 (April 3, 2018): 631–41. http://dx.doi.org/10.1080/02522667.2017.1385161.
Повний текст джерелаZhao, Jianjie, Jianzhong Zhang, and Rong Zhao. "A practical verifiable multi-secret sharing scheme." Computer Standards & Interfaces 29, no. 1 (January 2007): 138–41. http://dx.doi.org/10.1016/j.csi.2006.02.004.
Повний текст джерелаChan, Chao-Wen, and Chin-Chen Chang. "A scheme for threshold multi-secret sharing." Applied Mathematics and Computation 166, no. 1 (July 2005): 1–14. http://dx.doi.org/10.1016/j.amc.2004.04.081.
Повний текст джерелаPang, Liao-Jun, and Yu-Min Wang. "A new (t,n) multi-secret sharing scheme based on Shamir’s secret sharing." Applied Mathematics and Computation 167, no. 2 (August 2005): 840–48. http://dx.doi.org/10.1016/j.amc.2004.06.120.
Повний текст джерелаZhou, Jun, and Zhen Yu Yang. "Data Privacy Preservation in Wireless Sensor Networks Based on Multi-Secret Sharing Scheme." Applied Mechanics and Materials 411-414 (September 2013): 141–44. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.141.
Повний текст джерелаMesnager, Sihem, Ahmet Sınak, and Oğuz Yayla. "Threshold-Based Post-Quantum Secure Verifiable Multi-Secret Sharing for Distributed Storage Blockchain." Mathematics 8, no. 12 (December 14, 2020): 2218. http://dx.doi.org/10.3390/math8122218.
Повний текст джерелаQin, Hua Wang, Xiao Hua Zhu, and Yue Wei Dai. "A Leakproof Secret Sharing Scheme Based on Environment Sensing." Applied Mechanics and Materials 665 (October 2014): 647–53. http://dx.doi.org/10.4028/www.scientific.net/amm.665.647.
Повний текст джерелаYu, Bin, Gang Shen, and Zheng-xin Fu. "A Lossless Multi-secret Sharing Visual Cryptography Scheme." Journal of Electronics & Information Technology 34, no. 12 (July 11, 2013): 2885–90. http://dx.doi.org/10.3724/sp.j.1146.2012.00300.
Повний текст джерелаYang, Ching-Nung, Cheng-Hua Chen, and Song-Ruei Cai. "Enhanced Boolean-based multi secret image sharing scheme." Journal of Systems and Software 116 (June 2016): 22–34. http://dx.doi.org/10.1016/j.jss.2015.01.031.
Повний текст джерелаXiao, Heling, and Jingliang Gao. "Multi-party d-Level Quantum Secret Sharing Scheme." International Journal of Theoretical Physics 52, no. 6 (January 11, 2013): 2075–82. http://dx.doi.org/10.1007/s10773-012-1481-3.
Повний текст джерелаWang, Feng, You-sheng Zhou, and Dao-feng Li. "Dynamic threshold changeable multi-policy secret sharing scheme." Security and Communication Networks 8, no. 18 (June 4, 2015): 3653–58. http://dx.doi.org/10.1002/sec.1288.
Повний текст джерелаLi, Zhihui, Xue Jiang, and Lu Liu. "Multi-Party Quantum Secret Sharing Based on GHZ State." Entropy 24, no. 10 (October 8, 2022): 1433. http://dx.doi.org/10.3390/e24101433.
Повний текст джерелаWu, Zhen, Yining Liu, and Xingxing Jia. "A Novel Hierarchical Secret Image Sharing Scheme with Multi-Group Joint Management." Mathematics 8, no. 3 (March 19, 2020): 448. http://dx.doi.org/10.3390/math8030448.
Повний текст джерелаLin, Changlu, Huidan Hu, Chin-Chen Chang, and Shaohua Tang. "A Publicly Verifiable Multi-Secret Sharing Scheme With Outsourcing Secret Reconstruction." IEEE Access 6 (2018): 70666–73. http://dx.doi.org/10.1109/access.2018.2880975.
Повний текст джерелаZOU, Hui, and Jian-dong WANG. "Multi-level threshold multi-secret sharing scheme with proactive security." Journal of Computer Applications 29, no. 8 (October 9, 2009): 2218–19. http://dx.doi.org/10.3724/sp.j.1087.2009.02218.
Повний текст джерелаMAN, ZHONG-XIAO, YUN-JIE XIA, and ZHAN-JUN ZHANG. "MANY-AGENT CONTROLLED MULTI-PLAYER QUANTUM SECRET SHARING SCHEME." International Journal of Modern Physics C 18, no. 02 (February 2007): 177–85. http://dx.doi.org/10.1142/s0129183107010528.
Повний текст джерелаXIAO, Liangliang. "Linear multi-secret sharing schemes." Science in China Series F 48, no. 1 (2005): 125. http://dx.doi.org/10.1360/03yf0599.
Повний текст джерелаLin, Cheng-Shian, Chien-Chang Chen, and Yu-Cheng Chen. "XOR-Based Progressively Secret Image Sharing." Mathematics 9, no. 6 (March 12, 2021): 612. http://dx.doi.org/10.3390/math9060612.
Повний текст джерелаHa, Yan Yan, Shuai Ji, Wen Cai He, and Yao Zhang. "Multi-Secret Sharing Visual Cryptography Scheme Based on XOR Algorithm." Applied Mechanics and Materials 644-650 (September 2014): 2108–11. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.2108.
Повний текст джерелаFu, Zheng Xin, and Bin Yu. "A Modified Multi-Secret Visual Cryptography with Ring Shares." Advanced Engineering Forum 6-7 (September 2012): 343–49. http://dx.doi.org/10.4028/www.scientific.net/aef.6-7.343.
Повний текст джерелаYang, Yu Guang, and Hai Ping Chai. "A Trusted Multi-Party Authentication Scheme Based on Proactive-ElGamal Threshold Secret Sharing System." Applied Mechanics and Materials 235 (November 2012): 20–24. http://dx.doi.org/10.4028/www.scientific.net/amm.235.20.
Повний текст джерелаQin, Huawang, and Raylin Tso. "High-capacity quantum secret sharing based on orbital angular momentum." Quantum Information and Computation 18, no. 7&8 (June 2018): 579–91. http://dx.doi.org/10.26421/qic18.7-8-3.
Повний текст джерелаPANG, Liao-Jun, Qing-Qi PEI, Li-Cheng JIAO, and Yu-Min WANG. "An Identity (ID)-Based Threshold Multi-Secret Sharing Scheme." Journal of Software 19, no. 10 (October 20, 2008): 2739–45. http://dx.doi.org/10.3724/sp.j.1001.2008.02739.
Повний текст джерелаWu, Tsu-Yang, and Yuh-Min Tseng. "Publicly verifiable multi-secret sharing scheme from bilinear pairings." IET Information Security 7, no. 3 (September 1, 2013): 239–46. http://dx.doi.org/10.1049/iet-ifs.2012.0105.
Повний текст джерелаChen, Chien-Chang, and Wei-Jie Wu. "A secure Boolean-based multi-secret image sharing scheme." Journal of Systems and Software 92 (June 2014): 107–14. http://dx.doi.org/10.1016/j.jss.2014.01.001.
Повний текст джерелаYu, Ying, Hongliang Cai, Dan Tang, and Wei Yuan. "Multi-secret Image Sharing Scheme based on coding method." IOP Conference Series: Materials Science and Engineering 631 (November 7, 2019): 052043. http://dx.doi.org/10.1088/1757-899x/631/5/052043.
Повний текст джерелаNag, Amitava, Jyoti Prakash Singh, and Amit Kumar Singh. "An efficient Boolean based multi-secret image sharing scheme." Multimedia Tools and Applications 79, no. 23-24 (June 7, 2019): 16219–43. http://dx.doi.org/10.1007/s11042-019-07807-7.
Повний текст джерелаMartín del Rey, A. "A multi-secret sharing scheme for 3D solid objects." Expert Systems with Applications 42, no. 4 (March 2015): 2114–20. http://dx.doi.org/10.1016/j.eswa.2014.10.035.
Повний текст джерелаHsu, Ching-Fang, Qi Cheng, Xueming Tang, and Bing Zeng. "An ideal multi-secret sharing scheme based on MSP." Information Sciences 181, no. 7 (April 1, 2011): 1403–9. http://dx.doi.org/10.1016/j.ins.2010.11.032.
Повний текст джерелаLi, Bin. "Bipartite Threshold Multi-Secret Sharing Scheme Based on Hypersphere." American Journal of Computational Mathematics 09, no. 04 (2019): 207–20. http://dx.doi.org/10.4236/ajcm.2019.94016.
Повний текст джерелаChen, Chien-Chang, Wei-Jie Wu, and Jun-Long Chen. "Highly efficient and secure multi-secret image sharing scheme." Multimedia Tools and Applications 75, no. 12 (May 3, 2015): 7113–28. http://dx.doi.org/10.1007/s11042-015-2634-1.
Повний текст джерелаN, Rukma Rekha, Rolla Subrahmanyam, and Subba Rao Y.V. "Multi Group Key Agreement Protocol Using Secret Sharing Scheme." International Journal of Security and Networks 1, no. 1 (2023): 1. http://dx.doi.org/10.1504/ijsn.2023.10056277.
Повний текст джерела