Статті в журналах з теми "SECRET SHARING SYSTEM"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "SECRET SHARING SYSTEM".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
Errahmani, Hichem Bouchakour, and Hind Ikni. "A New Approach to Verifying and Sharing a Secret QR Code using Elliptic Curves." Malaysian Journal of Computing and Applied Mathematics 3, no. 1 (June 30, 2020): 55–65. http://dx.doi.org/10.37231/myjcam.2020.3.1.44.
Повний текст джерелаChoudhary, Shipra PraveenKumar, Apeksha Katarni, Shweta Manjrekar, Mrs Vidyullata Devmane, and Mrs Vaishali Hirlekar. "Secret Sharing Approach in Multi-database System." INTERNATIONAL JOURNAL OF COMPUTERS & TECHNOLOGY 15, no. 6 (April 20, 2016): 6819–23. http://dx.doi.org/10.24297/ijct.v15i6.1606.
Повний текст джерелаAlahmadi, Adel, Alaa Altassan, Ahmad AlKenani, Selda Çalkavur, Hatoon Shoaib, and Patrick Solé. "A Multisecret-Sharing Scheme Based on LCD Codes." Mathematics 8, no. 2 (February 18, 2020): 272. http://dx.doi.org/10.3390/math8020272.
Повний текст джерелаS.Patil, Rupali, Sonali Patil, and Sudeep D. Thepade. "Secret Sharing based Secure Authentication System." International Journal of Computer Applications 118, no. 22 (May 20, 2015): 8–11. http://dx.doi.org/10.5120/20875-3613.
Повний текст джерелаMiyamoto, Toshiyuki, Shinji Doi, Hiroki Nogawa, and Sadatoshi Kumagai. "Autonomous distributed secret sharing storage system." Systems and Computers in Japan 37, no. 6 (2006): 55–63. http://dx.doi.org/10.1002/scj.20388.
Повний текст джерелаErrahmani, Hichem Bouchakour, and Hind Ikni. "Verifiable Self-Selecting Secret Sharing Based on Elliptic Curves." International Journal of Software Innovation 8, no. 3 (July 2020): 51–68. http://dx.doi.org/10.4018/ijsi.2020070104.
Повний текст джерелаHashim, Ashwaq T., and Suhad A. Ali. "Reversible Multiple Image Secret Sharing Using Discrete Haar Wavelet Transform." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (December 1, 2018): 5004. http://dx.doi.org/10.11591/ijece.v8i6.pp5004-5013.
Повний текст джерелаLi, Ying, Hong Min Jiang, and Tao Hu. "A Study on Distributed License Authorization System Based on Threshold Secret Sharing." Applied Mechanics and Materials 380-384 (August 2013): 2749–52. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2749.
Повний текст джерелаLai, Chun-Pong, and Cunsheng Ding. "Several Generalizations of Shamir's Secret Sharing Scheme." International Journal of Foundations of Computer Science 15, no. 02 (April 2004): 445–58. http://dx.doi.org/10.1142/s0129054104002510.
Повний текст джерелаXu, Guoai, Jiangtao Yuan, Guosheng Xu, and Xingxing Jia. "A New Multi-stage Secret Sharing Scheme for Hierarchical Access Structure with Existential Quantifier." Information Technology and Control 50, no. 2 (June 17, 2021): 236–46. http://dx.doi.org/10.5755/j01.itc.50.2.27789.
Повний текст джерелаLatha, G. "Efficient Local Secret Sharing for Distributed Blockchain Systems." International Journal for Research in Applied Science and Engineering Technology 9, no. VI (June 20, 2021): 2043–48. http://dx.doi.org/10.22214/ijraset.2021.35445.
Повний текст джерелаDeng, Haoyuan, and Ershun Du. "Secret-sharing in distributed power system optimization." iEnergy 1, no. 3 (September 2022): 278. http://dx.doi.org/10.23919/ien.2022.0038.
Повний текст джерелаZhou, Jun, and Zhen Yu Yang. "Data Privacy Preservation in Wireless Sensor Networks Based on Multi-Secret Sharing Scheme." Applied Mechanics and Materials 411-414 (September 2013): 141–44. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.141.
Повний текст джерелаTian, Junfeng, and Yue Li. "Anticollusion Attack Strategy Combining Trust Metrics and Secret Sharing for Friendships Protection." Security and Communication Networks 2021 (July 5, 2021): 1–14. http://dx.doi.org/10.1155/2021/9717747.
Повний текст джерелаMesnager, Sihem, Ahmet Sınak, and Oğuz Yayla. "Threshold-Based Post-Quantum Secure Verifiable Multi-Secret Sharing for Distributed Storage Blockchain." Mathematics 8, no. 12 (December 14, 2020): 2218. http://dx.doi.org/10.3390/math8122218.
Повний текст джерелаHashim, Ashwaq Talib, and Zaid Mundher Radeef. "Multiple Image Secret Sharing based on Linear System." Indian Journal of Science and Technology 10, no. 33 (September 16, 2017): 1–17. http://dx.doi.org/10.17485/ijst/2017/v10i33/113085.
Повний текст джерелаHAYASHI, D. "Automatic Repair Mechanism of Secret Sharing Storage System." IEICE Transactions on Information and Systems E88-D, no. 5 (May 1, 2005): 971–75. http://dx.doi.org/10.1093/ietisy/e88-d.5.971.
Повний текст джерелаM. G. Al-Saidi, N., and M. M. Abdulhadi. "E–Voting System based on Secret Sharing Scheme." Engineering and Technology Journal 35, no. 1B (January 1, 2017): 13–18. http://dx.doi.org/10.30684/etj.35.1b.3.
Повний текст джерелаFramner, Erik, Simone Fischer-Hübner, Thomas Lorünser, Ala Sarah Alaqra, and John Sören Pettersson. "Making secret sharing based cloud storage usable." Information & Computer Security 27, no. 5 (November 11, 2019): 647–67. http://dx.doi.org/10.1108/ics-01-2019-0016.
Повний текст джерелаQin, Hua Wang, Xiao Hua Zhu, and Yue Wei Dai. "A Leakproof Secret Sharing Scheme Based on Environment Sensing." Applied Mechanics and Materials 665 (October 2014): 647–53. http://dx.doi.org/10.4028/www.scientific.net/amm.665.647.
Повний текст джерелаChang, Joy, Bo-Yuan Huang, and Justie Juan. "A New Visual Multi-Secrets Sharing Scheme by Random Grids." Cryptography 2, no. 3 (September 17, 2018): 24. http://dx.doi.org/10.3390/cryptography2030024.
Повний текст джерелаYadav, Mainejar, and Ranvijay . "Emerging Trends in Visual Secret Sharing." International Journal of Engineering & Technology 7, no. 3.12 (July 20, 2018): 374. http://dx.doi.org/10.14419/ijet.v7i3.12.16110.
Повний текст джерелаMIYAMOTO, T., Y. MORITA, and S. KUMAGAI. "Vertical Partitioning Method for Secret Sharing Distributed Database System." IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences E89-A, no. 11 (November 1, 2006): 3244–49. http://dx.doi.org/10.1093/ietfec/e89-a.11.3244.
Повний текст джерелаYamamoto, Hirosuke. "Secret sharing system using (k, L, n) threshold scheme." Electronics and Communications in Japan (Part I: Communications) 69, no. 9 (1986): 46–54. http://dx.doi.org/10.1002/ecja.4410690906.
Повний текст джерелаAl-Najjar, Hazem, and Nadia Al-Rousan. "SSDLP: Sharing Secret Data between Leader and Participant." Chinese Journal of Engineering 2014 (January 14, 2014): 1–7. http://dx.doi.org/10.1155/2014/736750.
Повний текст джерелаLi, Ping, Shengjun Li, Hongyang Yan, Lishan Ke, Teng Huang, and Alzubair Hassan. "A Group Identification Protocol with Leakage Resilience of Secret Sharing Scheme." Complexity 2020 (March 13, 2020): 1–13. http://dx.doi.org/10.1155/2020/1784276.
Повний текст джерелаChen, Hefeng, and Chin-Chen Chang. "A Novel (t,n) Secret Sharing Scheme Based upon Euler’s Theorem." Security and Communication Networks 2019 (April 1, 2019): 1–7. http://dx.doi.org/10.1155/2019/2387358.
Повний текст джерелаCheng, Jingwen, Xuehu Yan, Lintao Liu, Yue Jiang, and Xuan Wang. "Meaningful Secret Image Sharing with Saliency Detection." Entropy 24, no. 3 (February 26, 2022): 340. http://dx.doi.org/10.3390/e24030340.
Повний текст джерелаYu, Haoyang, Junwei Zhang, Zixiao Xiang, Biao Liu, and Huamin Feng. "Lossless Reversible Data Hiding in Encrypted Image for Multiple Data Hiders Based on Pixel Value Order and Secret Sharing." Sensors 23, no. 10 (May 18, 2023): 4865. http://dx.doi.org/10.3390/s23104865.
Повний текст джерелаWan, Song, Yuliang Lu, Xuehu Yan, and Lintao Liu. "A Novel Visual Secret Sharing Scheme Based on QR Codes." International Journal of Digital Crime and Forensics 9, no. 3 (July 2017): 38–48. http://dx.doi.org/10.4018/ijdcf.2017070104.
Повний текст джерелаPrasetyo, Heri, Chih-Hsien Hsia, and Alim Wicaksono Hari Prayuda. "Progressive Secret Sharing with Adaptive Priority and Perfect Reconstruction." Journal of Imaging 7, no. 4 (April 3, 2021): 70. http://dx.doi.org/10.3390/jimaging7040070.
Повний текст джерелаXie, Hui Juan, Wei She, and Chang Hao Han. "Shamir's Threshold Scheme to Ensure Security in Cloud Computing Services." Applied Mechanics and Materials 543-547 (March 2014): 3632–35. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.3632.
Повний текст джерелаLee, Jae Hwan, and Jong Hwan Park. "Broadcast Encryption System Using Secret Sharing and Subset Difference Methods." Journal of Broadcast Engineering 20, no. 1 (January 30, 2015): 92–109. http://dx.doi.org/10.5909/jbe.2015.20.1.92.
Повний текст джерелаLee, Chul-Ung, Hyoung Joong Kim, Jong Hyuk Park, Sang-Soo Yeo, and Jaesoo Yang. "A Pervasive Secret Sharing Scheme For Embedded Visual Communication System." Intelligent Automation & Soft Computing 16, no. 3 (January 2010): 433–47. http://dx.doi.org/10.1080/10798587.2010.10643091.
Повний текст джерелаTejedor-Romero, Marino, David Orden, Ivan Marsa-Maestre, Javier Junquera-Sanchez, and Jose Manuel Gimenez-Guzman. "Distributed Remote E-Voting System Based on Shamir’s Secret Sharing Scheme." Electronics 10, no. 24 (December 9, 2021): 3075. http://dx.doi.org/10.3390/electronics10243075.
Повний текст джерелаWu, Zhen, Yining Liu, and Xingxing Jia. "A Novel Hierarchical Secret Image Sharing Scheme with Multi-Group Joint Management." Mathematics 8, no. 3 (March 19, 2020): 448. http://dx.doi.org/10.3390/math8030448.
Повний текст джерелаP, Harshith, Kiran Kumar S R, KorniSesidhar Reddy, Srujan Reddy N, and Jyothi M. "SECRET IMAGE SHARING AND IDENTIFYING FAKE IMAGE USING BLOCK CHAIN." International Research Journal of Computer Science 9, no. 8 (August 13, 2022): 262–66. http://dx.doi.org/10.26562/irjcs.2022.v0908.21.
Повний текст джерелаAhmed, Ali, and Loay George. "Compression image sharing using DCT- Wavelet transform and coding by Blackely method." Iraqi Journal for Computers and Informatics 43, no. 1 (June 30, 2017): 28–39. http://dx.doi.org/10.25195/ijci.v43i1.74.
Повний текст джерелаYang, Yu Guang, and Hai Ping Chai. "A Trusted Multi-Party Authentication Scheme Based on Proactive-ElGamal Threshold Secret Sharing System." Applied Mechanics and Materials 235 (November 2012): 20–24. http://dx.doi.org/10.4028/www.scientific.net/amm.235.20.
Повний текст джерелаHosseini Beghaeiraveri, Seyed Amir, Mohammad Izadi, and Mohsen Rezvani. "Broadcast Complexity and Adaptive Adversaries in Verifiable Secret Sharing." Security and Communication Networks 2020 (August 1, 2020): 1–10. http://dx.doi.org/10.1155/2020/9428457.
Повний текст джерелаSankpal, Apurva, Adarsh Singh, Sanket Takalkar, Shubham Varma, and Prof Ayesha Sayyed. "Data Concealment Using Steganography Technique." International Journal for Research in Applied Science and Engineering Technology 10, no. 5 (May 31, 2022): 5257–64. http://dx.doi.org/10.22214/ijraset.2022.43185.
Повний текст джерелаLee, Jae Hwan, and Jong Hwan Park. "2-Subset Difference Broadcast Encryption System Based on Secret Sharing Method." Journal of Broadcast Engineering 20, no. 4 (July 30, 2015): 580–97. http://dx.doi.org/10.5909/jbe.2015.20.4.580.
Повний текст джерелаLee, Jae Hwan, and Jong Hwan Park. "A Transmission-Efficient Broadcast Encryption System Based on Secret Sharing Method." Journal of Broadcast Engineering 21, no. 3 (May 30, 2016): 412–24. http://dx.doi.org/10.5909/jbe.2016.21.3.412.
Повний текст джерелаMiyamoto, Toshiyuki, and Takeshi Ikemura. "Subquery Allocation Problem and Heuristics for Secret Sharing Distributed Database System." Journal of Computer Systems, Networks, and Communications 2010 (2010): 1–6. http://dx.doi.org/10.1155/2010/984059.
Повний текст джерелаSulaiman, Eric Christiandi, and Mariskha Tri Adithia. "THE VISUAL SECRET SHARING SCHEME BASED ON THE RGB COLOR SYSTEM." JUTI: Jurnal Ilmiah Teknologi Informasi 15, no. 1 (January 1, 2017): 56. http://dx.doi.org/10.12962/j24068535.v15i1.a635.
Повний текст джерелаLi, Li, M. Shamim Hossain, Ahmed A. Abd El-Latif, and M. F. Alhamid. "Distortion less secret image sharing scheme for Internet of Things system." Cluster Computing 22, S1 (November 30, 2017): 2293–307. http://dx.doi.org/10.1007/s10586-017-1345-y.
Повний текст джерелаSong, You-Jin, Seokmo Gu, and Yei-Chang Kim. "A Study on the Distributed Transcoding System using Secret Sharing Techniques." Journal of Digital Convergence 12, no. 11 (November 28, 2014): 233–39. http://dx.doi.org/10.14400/jdc.2014.12.11.233.
Повний текст джерелаLiu, Yuan, Licheng Wang, Xiaoying Shen, Lixiang Li, and Dezhi An. "Space-Efficient Key-Policy Attribute-Based Encryption from Lattices and Two-Dimensional Attributes." Security and Communication Networks 2020 (August 7, 2020): 1–11. http://dx.doi.org/10.1155/2020/2345369.
Повний текст джерелаBezzateev, Sergey, Vadim Davydov, and Aleksandr Ometov. "On Secret Sharing with Newton’s Polynomial for Multi-Factor Authentication." Cryptography 4, no. 4 (December 1, 2020): 34. http://dx.doi.org/10.3390/cryptography4040034.
Повний текст джерелаCree, Joy, and Alex May. "Code-routing: a new attack on position verification." Quantum 7 (August 9, 2023): 1079. http://dx.doi.org/10.22331/q-2023-08-09-1079.
Повний текст джерела