Статті в журналах з теми "Shared secrets"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся з топ-50 статей у журналах для дослідження на тему "Shared secrets".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Переглядайте статті в журналах для різних дисциплін та оформлюйте правильно вашу бібліографію.
ZHANG, EN, and YONGQUAN CAI. "RATIONAL MULTI-SECRET SHARING SCHEME IN STANDARD POINT-TO-POINT COMMUNICATION NETWORKS." International Journal of Foundations of Computer Science 24, no. 06 (September 2013): 879–97. http://dx.doi.org/10.1142/s012905411350024x.
Повний текст джерелаXu, Guoai, Jiangtao Yuan, Guosheng Xu, and Zhongkai Dang. "An Efficient Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations." Security and Communication Networks 2021 (July 20, 2021): 1–8. http://dx.doi.org/10.1155/2021/5566179.
Повний текст джерелаLuca, Daniela. "Secret of Life, Secret of Death." Romanian Journal of Psychoanalysis 13, no. 2 (December 1, 2020): 73–90. http://dx.doi.org/10.2478/rjp-2020-0017.
Повний текст джерелаSeitz, Frederick. "How allies shared radar secrets." Nature 384, no. 6608 (December 1996): 424–25. http://dx.doi.org/10.1038/384424a0.
Повний текст джерелаWu, Jingbang, Xiyu Chen, Luyuan Zhang, Shufen Zhou, and Daoshun Wang. "A Multi-Secret Reputation Adjustment Method in the Secret Sharing for Internet of Vehicles." Security and Communication Networks 2022 (May 13, 2022): 1–13. http://dx.doi.org/10.1155/2022/1413976.
Повний текст джерелаErrahmani, Hichem Bouchakour, and Hind Ikni. "A New Approach to Verifying and Sharing a Secret QR Code using Elliptic Curves." Malaysian Journal of Computing and Applied Mathematics 3, no. 1 (June 30, 2020): 55–65. http://dx.doi.org/10.37231/myjcam.2020.3.1.44.
Повний текст джерелаBadra, M., and I. Hajjeh. "Key-Exchange Authentication Using Shared Secrets." Computer 39, no. 3 (March 2006): 58–66. http://dx.doi.org/10.1109/mc.2006.94.
Повний текст джерелаBai, Hai-Yan, Zhi-Hui Li, and Na Hao. "Quantum Security Computation on Shared Secrets." International Journal of Theoretical Physics 58, no. 1 (October 15, 2018): 10–21. http://dx.doi.org/10.1007/s10773-018-3905-1.
Повний текст джерелаFrijns, Tom, Catrin Finkenauer, and Loes Keijsers. "Shared secrets versus secrets kept private are linked to better adolescent adjustment." Journal of Adolescence 36, no. 1 (February 2013): 55–64. http://dx.doi.org/10.1016/j.adolescence.2012.09.005.
Повний текст джерелаJENSEN, JOAN M. "Telling Stories: Keeping Secrets." Agricultural History 83, no. 4 (October 1, 2009): 437–45. http://dx.doi.org/10.1215/00021482-83.4.437.
Повний текст джерелаHashim, Ashwaq T., and Suhad A. Ali. "Reversible Multiple Image Secret Sharing Using Discrete Haar Wavelet Transform." International Journal of Electrical and Computer Engineering (IJECE) 8, no. 6 (December 1, 2018): 5004. http://dx.doi.org/10.11591/ijece.v8i6.pp5004-5013.
Повний текст джерелаHuang, Sheng-Yao, An-hui Lo, and Justie Su-Tzu Juan. "XOR-Based Meaningful (n, n) Visual Multi-Secrets Sharing Schemes." Applied Sciences 12, no. 20 (October 14, 2022): 10368. http://dx.doi.org/10.3390/app122010368.
Повний текст джерелаArriaga Flores, Mercedes. "SEXO FEMENINO: SECRETOS COMPARTIDOS DE MADO MARTÍNEZ." Revista Internacional de Culturas y Literaturas 11, no. 11 (2011): 33–41. http://dx.doi.org/10.12795/ricl.2011.i11.02.
Повний текст джерелаLeong Peng Chor, Hsu Wen Jing, and Tan Peng Chong. "A geometric approach for shared secrets, a refinement." Computers & Security 17, no. 8 (January 1998): 725–32. http://dx.doi.org/10.1016/s0167-4048(98)80102-8.
Повний текст джерелаGennaro, Rosario, and Mario Di Raimondo. "Secure multiplication of shared secrets in the exponent." Information Processing Letters 96, no. 2 (October 2005): 71–79. http://dx.doi.org/10.1016/j.ipl.2005.01.015.
Повний текст джерелаGRIGORIAN, Anna I. "PRAGMATIC PECULIARITIES OF VERBALIZATION OF SECRET IN ENGLISH FICTIONAL DISCOURSE." Мова, no. 37 (July 13, 2022): 36–41. http://dx.doi.org/10.18524/2307-4558.2022.37.261450.
Повний текст джерелаGuo, Chao, Chenglei Pan, Guangyu Hu, Dingbang Xie, Peiliang Zuo, and Yanyan Han. "Binary Symmetric Polynomial-Based Protected Fair Secret Sharing and Secure Communication over Satellite Networks." Wireless Communications and Mobile Computing 2022 (August 9, 2022): 1–9. http://dx.doi.org/10.1155/2022/8606589.
Повний текст джерелаHunter, L. E., C. Hopfer, S. F. Terry, and M. E. Coors. "Reporting Actionable Research Results: Shared Secrets Can Save Lives." Science Translational Medicine 4, no. 143 (July 18, 2012): 143cm8. http://dx.doi.org/10.1126/scitranslmed.3003958.
Повний текст джерелаAboud, Sattar J. "Efficient Scheme for Obtaining Public Key Cryptosystem Using Shared Secrets." Information Technology Journal 6, no. 2 (February 1, 2007): 259–62. http://dx.doi.org/10.3923/itj.2007.259.262.
Повний текст джерела., Bhagyashree G. "WIRELESS COMMUNICATION WITHOUT PRE-SHARED SECRETS USING SPREAD SPECTRUM TECHNIQUE." International Journal of Research in Engineering and Technology 04, no. 12 (December 25, 2015): 161–65. http://dx.doi.org/10.15623/ijret.2015.0412031.
Повний текст джерелаLin, Han-Yu. "A Pairing-Based Three-Party Authenticated Encryption Scheme without Shared Secrets." Symmetry 11, no. 5 (May 1, 2019): 605. http://dx.doi.org/10.3390/sym11050605.
Повний текст джерелаKnibbe, Kim. "Secrets, Gossip and Betrayal." Fieldwork in Religion 6, no. 2 (April 4, 2012): 151–67. http://dx.doi.org/10.1558/firn.v6i2.151.
Повний текст джерелаMALIK, ZAKI, and ATHMAN BOUGUETTAYA. "PRESERVING TRADE SECRETS BETWEEN COMPETITORS IN B2B INTERACTIONS." International Journal of Cooperative Information Systems 14, no. 02n03 (June 2005): 265–97. http://dx.doi.org/10.1142/s0218843005001146.
Повний текст джерелаBrigden, Susan. "‘The shadow that you know’: Sir Thomas Wyatt and Sir Francis Bryan at Court and in embassy." Historical Journal 39, no. 1 (March 1996): 1–31. http://dx.doi.org/10.1017/s0018246x00020653.
Повний текст джерелаHao, Xiang Ning, Xue Min Wang, and Li Qiong Deng. "A New Protocol for Secure Distributed Multiplication of Two Polynomial Shared Values." Advanced Materials Research 1042 (October 2014): 110–16. http://dx.doi.org/10.4028/www.scientific.net/amr.1042.110.
Повний текст джерелаLasc, Ioana, Reiner Dojen, and Tom Coffey. "A Mutual Authentication Protocol with Resynchronisation Capability for Mobile Satellite Communications." International Journal of Information Security and Privacy 5, no. 1 (January 2011): 33–49. http://dx.doi.org/10.4018/jisp.2011010103.
Повний текст джерелаJefferson, Andrew M., and Bethany E. Schmidt. "Concealment and revelation as bureaucratic and ethnographic practice: Lessons from Tunisian prisons." Critique of Anthropology 39, no. 2 (April 26, 2019): 155–71. http://dx.doi.org/10.1177/0308275x19842922.
Повний текст джерелаLasc, Ioana, Reiner Dojen, and Tom Coffey. "On the detection of desynchronisation attacks against security protocols that use dynamic shared secrets." Computers & Security 32 (February 2013): 115–29. http://dx.doi.org/10.1016/j.cose.2012.10.004.
Повний текст джерелаRichardson, Ruth. "Charles Dickens Post Mortem & Bare Life under the New Poor Law." European Journal of Life Writing 9 (July 6, 2020): LW&D81—LW&D107. http://dx.doi.org/10.21827/ejlw.9.36901.
Повний текст джерелаZaborskis, Mary. "Shared Secrets: The Queer World of Newbery Medalist, Charles J. Finger by Elizabeth Findley Shores." Journal of Southern History 88, no. 2 (May 2022): 404–6. http://dx.doi.org/10.1353/soh.2022.0089.
Повний текст джерелаPedersen, Torbjørn. "Polar Research and the Secrets of the Arctic." Arctic Review on Law and Politics 10 (2019): 103. http://dx.doi.org/10.23865/arctic.v10.1501.
Повний текст джерелаGil-Glazer, Ya’ara. "Secrets from the Family Album: Official and Silenced Knowledge on Migration." International Journal for History, Culture and Modernity 8, no. 1 (June 11, 2020): 80–96. http://dx.doi.org/10.1163/22130624-00801002.
Повний текст джерелаBurton, Alan, and Tom May. "‘Treading on sacred turf’: History, Femininity and the Secret War in the Plays for Today Licking Hitler, The Imitation Game and Rainy Day Women." Journal of British Cinema and Television 19, no. 3 (July 2022): 325–59. http://dx.doi.org/10.3366/jbctv.2022.0629.
Повний текст джерелаPatiño-Loira, Javier. "“Meddling with Royal Hearts”: Interiority and Privanza (1598-1643)." Culture & History Digital Journal 6, no. 2 (November 29, 2017): 017. http://dx.doi.org/10.3989/chdj.2017.017.
Повний текст джерелаSalman, Salman M. A., and Kishor Uprety. "Shared Watercourses and Water Security in South Asia: Challenges of Negotiating and Enforcing Treaties." Brill Research Perspectives in International Water Law 3, no. 3 (July 3, 2018): 1–100. http://dx.doi.org/10.1163/23529369-12340011.
Повний текст джерелаWang, Hong, and Shi Min Wei. "Secure Distributed Computation in the Exponent." Advanced Materials Research 217-218 (March 2011): 994–1000. http://dx.doi.org/10.4028/www.scientific.net/amr.217-218.994.
Повний текст джерелаRea, John. "Darmstadt as Refectory (Mess Hall)." Circuit 15, no. 3 (February 1, 2010): 73–77. http://dx.doi.org/10.7202/902372ar.
Повний текст джерелаBhagate, Suhas, and Prakash J. Kulkarni. "Improved Extended Progressive Visual Cryptography Scheme Using Pixel Harmonization." International Journal of Information Security and Privacy 15, no. 2 (April 2021): 196–216. http://dx.doi.org/10.4018/ijisp.2021040110.
Повний текст джерелаDang, Lanjun, Jie Xu, Xuefei Cao, Hui Li, Jie Chen, Yueyu Zhang, and Xiaotong Fu. "Efficient identity-based authenticated key agreement protocol with provable security for vehicular ad hoc networks." International Journal of Distributed Sensor Networks 14, no. 4 (April 2018): 155014771877254. http://dx.doi.org/10.1177/1550147718772545.
Повний текст джерелаWright, Zachary. "Secrets on the Muhammadan Way: Transmission of the Esoteric Sciences in 18th Century Scholarly Networks." Islamic Africa 9, no. 1 (May 7, 2018): 77–105. http://dx.doi.org/10.1163/21540993-00901005.
Повний текст джерелаCui, Li, Xing Qianqian, Wang Yi, Wang Baosheng, Tao Jing, and Liu Liu. "FSEE: A Forward Secure End-to-End Encrypted Message Transmission System for IoT." Security and Communication Networks 2022 (August 8, 2022): 1–18. http://dx.doi.org/10.1155/2022/2644716.
Повний текст джерелаZimanyi, Eszter. "Secrets, Surveillance, and Fragments: Some Contemporary Documentary Challenges to Post-Socialist Europe’s Regional Brand." Apertura 17, no. 1 (2021): 1–21. http://dx.doi.org/10.31176/apertura.2021.17.1.14.
Повний текст джерелаFredendall, Lawrence D., Peter Letmathe, and Nadine Uebe-Emden. "Supply chain management practices and intellectual property protection in China." International Journal of Operations & Production Management 36, no. 2 (February 1, 2016): 135–63. http://dx.doi.org/10.1108/ijopm-12-2013-0526.
Повний текст джерелаAbdel Hakeem, Shimaa A., and HyungWon Kim. "Centralized Threshold Key Generation Protocol Based on Shamir Secret Sharing and HMAC Authentication." Sensors 22, no. 1 (January 3, 2022): 331. http://dx.doi.org/10.3390/s22010331.
Повний текст джерелаTauriņš, Andris. "Big Data Ownership: Do we Need a New Regulatory Framework?" Baltic Yearbook of International Law Online 18, no. 1 (December 13, 2019): 117–33. http://dx.doi.org/10.1163/22115897_01801_008.
Повний текст джерелаΑναγνωστάκη, Λήδα, та Αθανασία Παπαθανασίου. "Μυστικά και εκμυστηρεύσεις: Πώς τα μικρά παιδιά χειρίζονται τα μυστικά". Psychology: the Journal of the Hellenic Psychological Society 18, № 2 (15 жовтня 2020): 121. http://dx.doi.org/10.12681/psy_hps.23713.
Повний текст джерелаEndurthi, Anjaneyulu, Oinam B. Chanu, Appala N. Tentu, and V. Ch Venkaiah. "Reusable Multi-Stage Multi-Secret Sharing Schemes Based on CRT." Journal of Communications Software and Systems 11, no. 1 (March 23, 2015): 15. http://dx.doi.org/10.24138/jcomss.v11i1.113.
Повний текст джерелаUlutas, Mustafa. "Meaningful Share Generation for Increased Number of Secrets in Visual Secret-Sharing Scheme." Mathematical Problems in Engineering 2010 (2010): 1–18. http://dx.doi.org/10.1155/2010/593236.
Повний текст джерелаGoyal, Preeti, and Arun Sahay. "Offshore Outsourcing of Business Processes: Understanding IPR Implications." Metamorphosis: A Journal of Management Research 6, no. 2 (July 2007): 105–14. http://dx.doi.org/10.1177/0972622520070203.
Повний текст джерелаAlahmadi, Adel, Alaa Altassan, Ahmad AlKenani, Selda Çalkavur, Hatoon Shoaib, and Patrick Solé. "A Multisecret-Sharing Scheme Based on LCD Codes." Mathematics 8, no. 2 (February 18, 2020): 272. http://dx.doi.org/10.3390/math8020272.
Повний текст джерела