Further results on strongbox secured secret sharing schemes (original) (raw)

Profile image of Greg GambleGreg Gamble

2004

visibility

description

31 pages

link

1 file

Two optimum secret sharing schemes revisited

Olivier Markowitch

2008

View PDFchevron_right

A Proposed Alternative to the Shamir Secret Sharing Scheme

Chum Chum

Contemporary Mathematics, 2012

View PDFchevron_right

Secret Shared Random Access Machine

Shlomi Dolev

Lecture Notes in Computer Science, 2016

View PDFchevron_right

Symmetric key-based authenticated encryption protocol

Sanjay Singh

Information Security Journal: A Global Perspective, 2019

View PDFchevron_right

An Explication of Multifarious Secret Sharing Schemes

SONALI PATIL

2012

View PDFchevron_right

Secure and Verifiable (2, 2) Secret Sharing Scheme for Binary Images

Sonali Patil

2013

View PDFchevron_right

Analyzing Relation in Application Semantics and Extended Capabilities for Secret Sharing Schemes

SONALI PATIL

2012

View PDFchevron_right

Secured and Authenticated Sharing of Software Program

Prashant Prajapati

Ijca Proceedings on International Conference and Workshop on Emerging Trends in Technology, 2012

View PDFchevron_right

Dynamic Key Generations for Secret Sharing in Access Structures

苇琦 李

19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers)

View PDFchevron_right

New (k,l,m)-verifiable multi-secret sharing schemes based on XTR public key system

Ekkehard Nuissl

Theoretical Computer Science, 2022

View PDFchevron_right

Loading...

Loading Preview

Sorry, preview is currently unavailable. You can download the paper by clicking the button above.

Secure Group Authentication Using a Non-Perfect Secret Sharing Scheme Based on Controlled Mixing

Kannan Karthik

2009 Annual IEEE India Conference, 2009

View PDFchevron_right

A New Authenticated Key Agreement Protocol

AbdAllah A . AlHabshy

New Technologies, Mobility and Security

View PDFchevron_right

Secure IX network

Jim Reeds

Distributed Computing and Cryptography, 1991

View PDFchevron_right

A Novel Unified Architecture for Public-Key Cryptography

L. Romano

Design, Automation and Test in Europe

View PDFchevron_right

HANDBOOK of APPLIED CRYPTOGRAPHY

Guilherme Morais

View PDFchevron_right

Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment

Marimuthu Karuppiah

Mobile Networks and Applications, 2018

View PDFchevron_right

Password-authenticated group key agreement with adaptive security and contributiveness

D. Catalano

2009

View PDFchevron_right

New Secure Load Sharing Algorithm in Network Layer

Ghizlane Orhanou

International Journal of Security and Its Applications, 2016

View PDFchevron_right

A Review Based Study of Key Exchange Algorithms

akhil kaushik

View PDFchevron_right

AC-RRNS: Anti-collusion secured data sharing scheme for cloud storage

Jorge Mario Cortés-Mendoza

International Journal of Approximate Reasoning

View PDFchevron_right

A secure solution for commercial digital libraries

Antonio Maña

Online Information Review, 2003

View PDFchevron_right

Contributions to Information Theoretically Secure Communication

Setareh Sharifian

2020

View PDFchevron_right

A survey of encryption standards

Ghulam Ali

Micro, IEEE, 1993

View PDFchevron_right

Effective Cryptographic Technique for Securing Cloud Storage Systems

Marvin Osei

International Journal of Applied Information Systems, 2017

View PDFchevron_right

Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm

IOSR Journals

View PDFchevron_right

Secret and communication preliminary remarks to a theoretical approach

László tarnay

1980

View PDFchevron_right

A Comparison Study on Key Exchange-Authentication protocol

Sin-Ban Ho

International Journal of Computer Applications, 2010

View PDFchevron_right

Secured Content Distribution Network Using Optimized RSA

Merlin Kurian

International Journal of Distributed and Parallel systems, 2011

View PDFchevron_right

gVault: A Gmail Based Cryptographic Network File System

Nalini Venkatasubramanian

Lecture Notes in Computer Science, 2007

View PDFchevron_right

Advances in Security in Computing and Communications

MUFTAH FRAIFER

Advances in Security in Computing and Communications

View PDFchevron_right

Concurrent Secrets

Marek Bednarczyk

Discrete Event Dynamic Systems, 2007

View PDFchevron_right

From Security Protocols to Systems Security

Brian Monahan

Lecture Notes in Computer Science, 2005

View PDFchevron_right

Cryptography: A Review

Dr. Amosa Babalola

2021

View PDFchevron_right

A Study on Techniques for Access Control and Key Management in the Cloud for Secured Communication

Ghanshyam Nikhade

International Journal of Innovations in Engineering and Science

View PDFchevron_right

Arcanum: a secure and efficient key exchange protocol for the Internet

Ashraf Masood

International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004., 2004

View PDFchevron_right

StatisticsInfluencePure MathematicsPowerInformation ContentNestSecret Sharing