|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 756 occurrences of 312 keywords
|
|
|
Results
Found 3139 publication records. Showing 3139 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
171 | K. Srinathan, N. Tharani Rajan, C. Pandu Rangan |
Non-perfect Secret Sharing over General Access Structures. |
INDOCRYPT |
2002 |
DBLP DOI BibTeX RDF |
non-threshold secret sharing, non-perfect secret sharing |
137 | Keith M. Martin, Josef Pieprzyk, Reihaneh Safavi-Naini, Huaxiong Wang |
Changing Thresholds in the Absence of Secure Channels. |
ACISP |
1999 |
DBLP DOI BibTeX RDF |
Threshold Changeable Secret Sharing, Shamir Secret Sharing, Geometrical Secret Sharing, Secret Sharing |
131 | László Csirmaz |
The Size of a Share Must Be Large. |
J. Cryptol. |
1997 |
DBLP DOI BibTeX RDF |
Polymatroid structures, Polymatroid structures, Secret sharing, Secret sharing, Key words, Ideal secret sharing schemes, Ideal secret sharing schemes, Perfect security, Perfect security |
124 | Jaume Martí-Farré, Carles Padró |
Ideal Secret Sharing Schemes Whose Minimal Qualified Subsets Have at Most Three Participants. |
SCN |
2006 |
DBLP DOI BibTeX RDF |
Ideal access structures, Secret sharing representable matroids, Secret sharing, Ideal secret sharing schemes, Information rate |
120 | Reihaneh Safavi-Naini, Huaxiong Wang |
Secret sharing schemes with partial broadcast channels. |
Des. Codes Cryptogr. |
2006 |
DBLP DOI BibTeX RDF |
94A17, 68P30, AMS classifications 94A62 |
119 | Phillip Rogaway, Mihir Bellare |
Robust computational secret sharing and a unified account of classical secret-sharing goals. |
CCS |
2007 |
DBLP DOI BibTeX RDF |
computational secret sharing, robust computational secret-sharing, provable security, cryptographic protocols, secret sharing, survivable storage |
116 | Giovanni Di Crescenzo |
Sharing One Secret vs. Sharing Many Secrets: Tight Bounds for the Max Improvement Ratio. |
MFCS |
2001 |
DBLP DOI BibTeX RDF |
Multi-Secret Sharing, Cryptography, Secret Sharing |
116 | Oriol Farràs, Jaume Martí-Farré, Carles Padró |
Ideal Multipartite Secret Sharing Schemes. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
Ideal access structures, Multipartite secret sharing, Multipartite matroids, Discrete polymatroids, Secret sharing, Ideal secret sharing schemes |
106 | Shaik Maleka, Amjed Shareef, C. Pandu Rangan |
The deterministic protocol for rational secret sharing. |
IPDPS |
2008 |
DBLP DOI BibTeX RDF |
|
106 | Jun Kurihara, Shinsaku Kiyomoto, Kazuhide Fukushima, Toshiaki Tanaka |
A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. |
ISC |
2008 |
DBLP DOI BibTeX RDF |
threshold ramp scheme, entropy, random number, Secret sharing scheme, threshold scheme, ideal secret sharing scheme, exclusive-or |
102 | Li Bai |
A Reliable (k, n) Image Secret Sharing Scheme. |
DASC |
2006 |
DBLP DOI BibTeX RDF |
matrix projection, image processing, secret sharing |
98 | Ching-Nung Yang, Chung-Chun Wang, Tse-Shih Chen |
Real Perfect Contrast Visual Secret Sharing Schemes with Reversing. |
ACNS |
2006 |
DBLP DOI BibTeX RDF |
Visual secret sharing scheme, ideal contrast, secret sharing scheme |
95 | Wenping Ma 0002, Fu Tai Zhang |
New Methods to Construct Cheating Immune Multisecret Sharing Scheme. |
CISC |
2005 |
DBLP DOI BibTeX RDF |
Quadratic Function, Cheating Immune Function, Multisecret Secret Sharing, Secret Sharing |
94 | László Csirmaz |
The Size of a Share Must Be Large. |
EUROCRYPT |
1994 |
DBLP DOI BibTeX RDF |
polymatroid structures, Secret sharing, ideal secret sharing schemes, perfect security |
93 | Josef Pieprzyk, Xian-Mo Zhang |
Cheating Prevention in Secret Sharing over GF(pt). |
INDOCRYPT |
2001 |
DBLP DOI BibTeX RDF |
Nonlinear Secret Sharing, Cheating Immunity, Secret Sharing |
88 | Amos Beimel, Tamir Tassa, Enav Weinreb |
Characterizing Ideal Weighted Threshold Secret Sharing. |
TCC |
2005 |
DBLP DOI BibTeX RDF |
|
87 | Shlomi Dolev, Limor Lahiani, Moti Yung |
Secret Swarm UnitReactive k-Secret Sharing. |
INDOCRYPT |
2007 |
DBLP DOI BibTeX RDF |
mobile computing, secret sharing |
87 | Brian King |
Randomness Required for Linear Threshold Sharing Schemes Defined over Any Finite Abelian Group. |
ACISP |
2001 |
DBLP DOI BibTeX RDF |
Linear secret sharing, Randomness requirements, Threshold secret sharing |
86 | Brian King |
A Comment on Group Independent Threshold Sharing. |
WISA |
2003 |
DBLP DOI BibTeX RDF |
integer span programs, group independent threshold schemes, black-box sharing, secret sharing, threshold cryptography, monotone span programs |
84 | Josef Pieprzyk, Xian-Mo Zhang |
Cheating Prevention in Linear Secret Sharing. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
Linear Secret Sharing Schemes, Cheating Identification, Cryptography, Secret Sharing, Cheating Detection |
84 | Lein Harn, Changlu Lin |
Detection and identification of cheaters in ( t , n ) secret sharing scheme. |
Des. Codes Cryptogr. |
2009 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 94A62 |
83 | Shaik Maleka, Amjed Shareef, C. Pandu Rangan |
Rational Secret Sharing with Repeated Games. |
ISPEC |
2008 |
DBLP DOI BibTeX RDF |
distributed computing, game theory, Secret sharing, repeated games |
83 | Sergio Cabello, Carles Padró, Germán Sáez |
Secret Sharing Schemes with Detection of Cheaters for a General Access Structure. |
FCT |
1999 |
DBLP DOI BibTeX RDF |
Detection of cheaters, Robust and secure schemes, Cryptography, Secret sharing schemes |
82 | Yi-Chun Wang, Justie Su-tzu Juan |
Simple Multi-Secret Sharing Schemes to Achieve the Optimal Maximum Improvement Ratio. |
SUTC (2) |
2006 |
DBLP DOI BibTeX RDF |
|
82 | Ernest F. Brickell |
Some Ideal Secret Sharing Schemes. |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
80 | Benny Chor, Eyal Kushilevitz |
Secret Sharing Over Infinite Domains (Extended Abstract). |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
79 | Jaume Martí-Farré, Carles Padró |
On Secret Sharing Schemes, Matroids and Polymatroids. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
Ideal access structures, Secret sharing, Matroids, Ideal secret sharing schemes, Information rate, Polymatroids |
79 | Brian King |
Requirements for Group Independent Linear Threshold Secret Sharing Schemes. |
ACISP |
2002 |
DBLP DOI BibTeX RDF |
linear secret sharing, group independent linear threshold schemes, monotone span programs and bounds on share size, secret sharing, threshold cryptography |
79 | Renato M. Capocelli, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro |
On the Size of Shares for Secret Sharing Schemes. |
CRYPTO |
1991 |
DBLP DOI BibTeX RDF |
|
78 | Vanesa Daza, Josep Domingo-Ferrer |
On Partial Anonymity in Secret Sharing. |
EuroPKI |
2007 |
DBLP DOI BibTeX RDF |
Privacy, Protocols, Secret sharing |
78 | Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini |
Secret Sharing in Multilevel and Compartmented Groups. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
Hierarchical and Compartmented Access Structures, Ideal Schemes, Secret Sharing, Perfect Security |
76 | Hui-Xian Li, Liao-Jun Pang, Wan-Dong Cai |
An Efficient Threshold Multi-group-Secret Sharing Scheme. |
ICFIE |
2007 |
DBLP DOI BibTeX RDF |
Multi-group-secret sharing, Chinese Remain Theorem, Secret sharing, Threshold |
76 | Hiroki Koga, Etsuyo Ueda |
Basic Properties of the (t, n)-Threshold Visual Secret Sharing Scheme with Perfect Reconstruction of Black Pixels. |
Des. Codes Cryptogr. |
2006 |
DBLP DOI BibTeX RDF |
Secret sharing, Visual cryptography, Threshold scheme, Visual secret sharing |
76 | Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe |
Mutually Trusted Authority-Free Secret Sharing Schemes. |
J. Cryptol. |
1997 |
DBLP DOI BibTeX RDF |
Key words, Secret sharing schemes, Secret sharing schemes |
76 | Vinod Vaikuntanathan, Arvind Narayanan, K. Srinathan, C. Pandu Rangan, Kwangjo Kim |
On the Power of Computational Secret Sharing. |
INDOCRYPT |
2003 |
DBLP DOI BibTeX RDF |
computationally bounded players, monotone P, Secret sharing, access structures |
75 | Carlo Blundo, Alfredo De Santis, Roberto de Simone, Ugo Vaccaro |
Tight Bounds on the Information Rate of Secret Sharing Schemes. |
Des. Codes Cryptogr. |
1997 |
DBLP DOI BibTeX RDF |
Information Rate and Cryptography, Entropy, Secret Sharing, Data Security |
73 | Ilker Nadi Bozkurt, Kamer Kaya, Ali Aydin Selçuk |
Practical Threshold Signatures with Linear Secret Sharing Schemes. |
AFRICACRYPT |
2009 |
DBLP DOI BibTeX RDF |
Linear secret sharing, function sharing, threshold cryptography |
73 | Stefan Droste |
New Results on Visual Cryptography. |
CRYPTO |
1996 |
DBLP DOI BibTeX RDF |
Secret Sharing Problem, Secret Sharing Scheme, Visual Cryptography |
72 | Huaxiong Wang, Duncan S. Wong |
On Secret Reconstruction in Secret Sharing Schemes. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
72 | Hao Chen, San Ling, Chaoping Xing |
Access Structures of Elliptic Secret Sharing Schemes. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
72 | Yvo Desmedt, Kaoru Kurosawa, Tri Van Le |
Error Correcting and Complexity Aspects of Linear Secret Sharing Schemes. |
ISC |
2003 |
DBLP DOI BibTeX RDF |
|
71 | Tamir Tassa |
Hierarchical Threshold Secret Sharing. |
J. Cryptol. |
2007 |
DBLP DOI BibTeX RDF |
|
71 | Josh Cohen Benaloh, Jerry Leichter |
Generalized Secret Sharing and Monotone Functions. |
CRYPTO |
1988 |
DBLP DOI BibTeX RDF |
|
71 | Kamer Kaya, Ali Aydin Selçuk |
A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem. |
INDOCRYPT |
2008 |
DBLP DOI BibTeX RDF |
joint random secret sharing, Asmuth-Bloom secret sharing scheme, Chinese Remainder Theorem, Verifiability |
71 | Jovan Dj. Golic |
On Matroid Characterization of Ideal Secret Sharing Schemes. |
J. Cryptol. |
1998 |
DBLP DOI BibTeX RDF |
Matroids, Matroids, Key words, Ideal secret sharing schemes, Ideal secret sharing schemes, Access structures, Access structures |
71 | Hugo Krawczyk |
Secret Sharing Made Short. |
CRYPTO |
1993 |
DBLP DOI BibTeX RDF |
|
70 | Ching-Nung Yang, Tse-Shih Chen |
An Image Secret Sharing Scheme with the Capability of Previvewing the Secret Image. |
ICME |
2007 |
DBLP DOI BibTeX RDF |
|
69 | Amos Beimel, Matthew K. Franklin |
Weakly-Private Secret Sharing Schemes. |
TCC |
2007 |
DBLP DOI BibTeX RDF |
|
68 | Lein Harn, Hung-Yu Lin |
An l-Span Generalized Secret Sharing Scheme. |
CRYPTO |
1992 |
DBLP DOI BibTeX RDF |
|
67 | Shoulun Long, Josef Pieprzyk, Huaxiong Wang, Duncan S. Wong |
Generalised Cumulative Arrays in Secret Sharing. |
Des. Codes Cryptogr. |
2006 |
DBLP DOI BibTeX RDF |
Cumulative array, Perfect hash family, Secret sharing |
67 | Siaw-Lynn Ng |
A Representation of a Family of Secret Sharing Matroids. |
Des. Codes Cryptogr. |
2003 |
DBLP DOI BibTeX RDF |
projective geometry, matroids, ideal secret sharing schemes |
67 | Christian Cachin, Klaus Kursawe, Anna Lysyanskaya, Reto Strobl |
Asynchronous verifiable secret sharing and proactive cryptosystems. |
CCS |
2002 |
DBLP DOI BibTeX RDF |
model, secret sharing, asynchronous, proactive |
67 | Hong-Hao Chen, Cheng-Chi Lee, Chih-Chiang Lee, Hsien-Chu Wu, Chwei-Shyong Tsai |
Multi-level visual secret sharing scheme with smooth-looking. |
ICIS |
2009 |
DBLP DOI BibTeX RDF |
code book, non-pixel expansion shares, visual cryptography, visual secret sharing |
66 | Amos Beimel, Noam Livne, Carles Padró |
Matroids Can Be Far from Ideal Secret Sharing. |
TCC |
2008 |
DBLP DOI BibTeX RDF |
|
66 | Ronald Cramer, Serge Fehr |
Optimal Black-Box Secret Sharing over Arbitrary Abelian Groups. |
CRYPTO |
2002 |
DBLP DOI BibTeX RDF |
|
66 | Chin-Chen Chang 0001, Jun-Chou Chuang, Pei-Yu Lin |
Sharing a Secret Two-Tone Image in Two Gray-Level Images. |
ICPADS (2) |
2005 |
DBLP DOI BibTeX RDF |
data encryption, visual cryptography, image hiding, Visual secret sharing |
66 | Wei Chen, Xiang Long, Yuebin Bai, Xiaopeng Gao |
A New Dynamic Threshold Secret Sharing Scheme from Bilinear Maps. |
ICPP Workshops |
2007 |
DBLP DOI BibTeX RDF |
|
65 | Michael Beiter |
Combiner Driven Management Models and Their Applications. |
WEWoRC |
2007 |
DBLP DOI BibTeX RDF |
multi-time secret sharing, threshold schemes with update capabilities, secret sharing, management models |
64 | Christophe Tartary, Josef Pieprzyk, Huaxiong Wang |
Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
Threshold Access Structures, Share Verifiability, Keyed One-Way Functions, Chinese Remainder Theorem, Secret Sharing Scheme |
64 | Josh Cohen Benaloh |
Secret Sharing Homomorphisms: Keeping Shares of A Secret Sharing. |
CRYPTO |
1986 |
DBLP DOI BibTeX RDF |
|
63 | Justie Su-tzu Juan, Chia-Li Huang |
Efficient Secret Sharing Schemes from Room Square. |
ICITA (2) |
2005 |
DBLP DOI BibTeX RDF |
|
63 | Tamir Tassa |
Hierarchical Threshold Secret Sharing. |
TCC |
2004 |
DBLP DOI BibTeX RDF |
|
62 | Maged Hamada Ibrahim |
Verifiable Threshold Sharing of a Large Secret Safe-Prime. |
ITCC (1) |
2005 |
DBLP DOI BibTeX RDF |
Robust Threshold Signature Schemes, Multi-Prime RSA, RSA Function Sharing, Threshold Cryptography, VSS |
62 | Huawang Qin, Yuewei Dai, Zhiquan Wang |
A secret sharing scheme based on (t, n) threshold and adversary structure. |
Int. J. Inf. Sec. |
2009 |
DBLP DOI BibTeX RDF |
Adversary structure, Cryptography, Information security, Secret sharing, Threshold |
62 | Jong-Phil Yang, Kyung Hyune Rhee, Kouichi Sakurai |
A Proactive Secret Sharing for Server Assisted Threshold Signatures. |
HPCC |
2006 |
DBLP DOI BibTeX RDF |
Fault tolerant and Distributed Computing, Secret sharing |
61 | Satoshi Obana, Toshinori Araki |
Almost Optimum Secret Sharing Schemes Secure Against Cheating for Arbitrary Secret Distribution. |
ASIACRYPT |
2006 |
DBLP DOI BibTeX RDF |
|
61 | Arun Subbiah, Douglas M. Blough |
An approach for fault tolerant and secure data storage in collaborative work environments. |
StorageSS |
2005 |
DBLP DOI BibTeX RDF |
replication, secret sharing, confidentiality, collaborative environments, Byzantine fault tolerance, distributed data storage |
61 | Liaojun Pang, Huixian Li, Ye Yao, Yumin Wang |
A Verifiable (t, n) Multiple Secret Sharing Scheme and Its Analyses. |
ISECS |
2008 |
DBLP DOI BibTeX RDF |
|
60 | Carlo Blundo, Alfredo De Santis, Luisa Gargano, Ugo Vaccaro |
Secret Sharing Schemes with Veto Capabilities. |
Algebraic Coding |
1993 |
DBLP DOI BibTeX RDF |
|
60 | Wen-Ai Jackson, Keith M. Martin, Christine M. O'Keefe |
On Sharing Many Secrets (Extended Abstract). |
ASIACRYPT |
1994 |
DBLP DOI BibTeX RDF |
|
59 | Tamir Tassa, Nira Dyn |
Multipartite Secret Sharing by Bivariate Interpolation. |
J. Cryptol. |
2009 |
DBLP DOI BibTeX RDF |
Multipartite access structures, Compartmented access structures, Hierarchical threshold access structures, Secret sharing, Bivariate interpolation, Monotone span programs |
59 | Rida A. Bazzi, Goran Konjevod |
Efficient Verification for Provably Secure Storage and Secret Sharing in Systems Where Half the Servers Are Faulty. |
DISC |
2004 |
DBLP DOI BibTeX RDF |
secret sharing, Byzantine failures, Secure storage |
59 | Giovanni Di Crescenzo, Clemente Galdi |
Hypergraph Decomposition and Secret Sharing. |
ISAAC |
2003 |
DBLP DOI BibTeX RDF |
Hypergraph Decomposition, Algorithms, Cryptography, Secret Sharing |
58 | Noam Kogan, Tamir Tassa |
Improved efficiency for revocation schemes via Newton interpolation. |
ACM Trans. Inf. Syst. Secur. |
2006 |
DBLP DOI BibTeX RDF |
Newton interpolation, secret sharing, broadcast encryption, User revocation |
58 | Amos Beimel, Noam Livne |
On Matroids and Nonideal Secret Sharing. |
IEEE Trans. Inf. Theory |
2008 |
DBLP DOI BibTeX RDF |
|
58 | Jia Yu 0003, Fanyu Kong, Rong Hao, Xuliang Li 0001 |
How to Publicly Verifiably Expand a Member without Changing Old Shares in a Secret Sharing Scheme. |
ISI Workshops |
2008 |
DBLP DOI BibTeX RDF |
digital signature, forward security, bilinear maps, Computation Diffie-Hellman problem |
58 | Amos Beimel, Noam Livne |
On Matroids and Non-ideal Secret Sharing. |
TCC |
2006 |
DBLP DOI BibTeX RDF |
|
57 | Amir Herzberg, Stanislaw Jarecki, Hugo Krawczyk, Moti Yung |
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage. |
CRYPTO |
1995 |
DBLP DOI BibTeX RDF |
|
56 | Avishek Adhikari, Tridib Kumar Dutta, Bimal K. Roy |
A New Black and White Visual Cryptographic Scheme for General Access Structures. |
INDOCRYPT |
2004 |
DBLP DOI BibTeX RDF |
visual secret sharing scheme, visual threshold scheme, general access structure, secret sharing scheme, visual cryptography |
56 | Ueli M. Maurer |
Secure Multi-party Computation Made Simple. |
SCN |
2002 |
DBLP DOI BibTeX RDF |
adversary structures, secret-sharing, Secure multi-party computation, verifiable secret-sharing |
56 | Tiancheng Lou, Christophe Tartary |
Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes. |
CANS |
2008 |
DBLP DOI BibTeX RDF |
Threshold Changeability, Security Rate, Dealer Free Update, Chinese Remainder Theorem, Secret Sharing Scheme, Information Rate |
56 | Gonzalo Álvarez Marañón, Luis Hernández Encinas, Ángel Martín del Rey |
A New Secret Sharing Scheme for Images Based on Additive 2-Dimensional Cellular Automata. |
IbPRIA (1) |
2005 |
DBLP DOI BibTeX RDF |
Image processing, Cryptography, Cellular automata, Secret sharing |
56 | Joseph Y. Halpern, Vanessa Teague |
Rational secret sharing and multiparty computation: extended abstract. |
STOC |
2004 |
DBLP DOI BibTeX RDF |
iterated deletion of weakly dominated strategies, non-cooperative computing, game theory, secret sharing, multiparty computation |
55 | Xian-Mo Zhang, Josef Pieprzyk |
Cheating Immune Secret Sharing. |
ICICS |
2001 |
DBLP DOI BibTeX RDF |
|
55 | Thomas Beth, Hans-Joachim Knobloch, Marcus Otten |
Verifiable Secret Sharing for Monotone Access Structures. |
CCS |
1993 |
DBLP DOI BibTeX RDF |
|
55 | Chuangui Ma, Rui Cheng |
Key Management Based on Hierarchical Secret Sharing in Ad-Hoc Networks. |
Inscrypt |
2007 |
DBLP DOI BibTeX RDF |
hierarchical secret sharing, ad-hoc network, key management, verifiable secret sharing |
53 | Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran |
Responsive Security for Stored Data. |
IEEE Trans. Parallel Distributed Syst. |
2003 |
DBLP DOI BibTeX RDF |
distributed storage service, Security, data integrity, replication, availability, secret sharing, confidentiality, Byzantine fault tolerance |
53 | Subramanian Lakshmanan, Mustaque Ahamad, H. Venkateswaran |
Responsive Security for Stored Data. |
ICDCS |
2003 |
DBLP DOI BibTeX RDF |
distributed storage service, Security, data integrity, replication, availability, secret sharing, confidentiality, Byzantine fault tolerance |
53 | Miyuki Uno, Mikio Kano |
Visual Secret Sharing Schemes with Cyclic Access Structure for Many Images. |
ICISC |
2008 |
DBLP DOI BibTeX RDF |
|
53 | Hui-Xian Li, Chun-Tian Cheng, Liao-Jun Pang |
A New (t, n)-Threshold Multi-secret Sharing Scheme. |
CIS (2) |
2005 |
DBLP DOI BibTeX RDF |
|
53 | Ernest F. Brickell, Daniel M. Davenport |
On the Classification of Idea Secret Sharing Schemes. |
CRYPTO |
1989 |
DBLP DOI BibTeX RDF |
|
52 | Kai Wang, Xukai Zou, Yan Sui |
A Multiple Secret Sharing Scheme based on Matrix Projection. |
COMPSAC (1) |
2009 |
DBLP DOI BibTeX RDF |
|
52 | Ching-Nung Yang, Tse-Shih Chen |
New Aspect Ratio Invariant Visual Secret Sharing Schemes Using Square Block-Wise Operation. |
ICIAR |
2005 |
DBLP DOI BibTeX RDF |
|
52 | Yvo Desmedt, Brian King, Berry Schoenmakers |
Revisiting the Karnin, Greene and Hellman Bounds. |
ICITS |
2008 |
DBLP DOI BibTeX RDF |
|
51 | Li Bai |
Generalized Access Structure Congestion System. |
IEEE Trans. Reliab. |
2007 |
DBLP DOI BibTeX RDF |
|
51 | Barbara Masucci |
Sharing Multiple Secrets: Models, Schemes and Analysis. |
Des. Codes Cryptogr. |
2006 |
DBLP DOI BibTeX RDF |
62B10, AMS Classification 94A62 |
51 | Li Zhang 0066, Ping-Ping Zhou, Gong-bin Qian, Zhen Ji |
A DWT Blind Image Watermarking Strategy with Secret Sharing. |
PCM |
2007 |
DBLP DOI BibTeX RDF |
blind image watermarking, secret sharing, closed loop, Stirmark |
51 | Tamir Tassa, Nira Dyn |
Multipartite Secret Sharing by Bivariate Interpolation. |
ICALP (2) |
2006 |
DBLP DOI BibTeX RDF |
multipartite access structures, compartmented access structures, hierarchical threshold access structures, Secret sharing, bivariate interpolation, monotone span programs |
51 | Anderson C. A. Nascimento, Jörn Müller-Quade, Akira Otsuka, Goichiro Hanaoka, Hideki Imai |
Unconditionally Non-interactive Verifiable Secret Sharing Secure against Faulty Majorities in the Commodity Based Model. |
ACNS |
2004 |
DBLP DOI BibTeX RDF |
pre-distributed data, Verifiable secret sharing, multiparty protocols |
51 | Mida Guillermo, Keith M. Martin, Christine M. O'Keefe |
Providing Anonymity in Unconditionally Secure Secret Sharing Schemes. |
Des. Codes Cryptogr. |
2003 |
DBLP DOI BibTeX RDF |
cryptography, anonymity, secret sharing |
Displaying result #1 - #100 of 3139 (100 per page; Change: ) Pages: [ 1][ 2][ 3][ 4][ 5][ 6][ 7][ 8][ 9][ 10][ >>] |
|