Further results on strongbox secured secret sharing schemes (original) (raw)
2004
visibility
…
description
31 pages
link
1 file
Related papers
Two optimum secret sharing schemes revisited
2008
A Proposed Alternative to the Shamir Secret Sharing Scheme
Contemporary Mathematics, 2012
Secret Shared Random Access Machine
Lecture Notes in Computer Science, 2016
Symmetric key-based authenticated encryption protocol
Information Security Journal: A Global Perspective, 2019
An Explication of Multifarious Secret Sharing Schemes
2012
Secure and Verifiable (2, 2) Secret Sharing Scheme for Binary Images
2013
Analyzing Relation in Application Semantics and Extended Capabilities for Secret Sharing Schemes
2012
Secured and Authenticated Sharing of Software Program
Ijca Proceedings on International Conference and Workshop on Emerging Trends in Technology, 2012
Dynamic Key Generations for Secret Sharing in Access Structures
19th International Conference on Advanced Information Networking and Applications (AINA'05) Volume 1 (AINA papers)
New (k,l,m)-verifiable multi-secret sharing schemes based on XTR public key system
Theoretical Computer Science, 2022
Loading Preview
Sorry, preview is currently unavailable. You can download the paper by clicking the button above.
Related papers
Secure Group Authentication Using a Non-Perfect Secret Sharing Scheme Based on Controlled Mixing
2009 Annual IEEE India Conference, 2009
A New Authenticated Key Agreement Protocol
New Technologies, Mobility and Security
Distributed Computing and Cryptography, 1991
A Novel Unified Architecture for Public-Key Cryptography
Design, Automation and Test in Europe
HANDBOOK of APPLIED CRYPTOGRAPHY
Secure Remote User Mutual Authentication Scheme with Key Agreement for Cloud Environment
Mobile Networks and Applications, 2018
Password-authenticated group key agreement with adaptive security and contributiveness
2009
New Secure Load Sharing Algorithm in Network Layer
International Journal of Security and Its Applications, 2016
A Review Based Study of Key Exchange Algorithms
AC-RRNS: Anti-collusion secured data sharing scheme for cloud storage
International Journal of Approximate Reasoning
A secure solution for commercial digital libraries
Online Information Review, 2003
Contributions to Information Theoretically Secure Communication
2020
A survey of encryption standards
Micro, IEEE, 1993
Effective Cryptographic Technique for Securing Cloud Storage Systems
International Journal of Applied Information Systems, 2017
Implementation of Secure Cloud Storage Gateway using Symmetric Key Algorithm
Secret and communication preliminary remarks to a theoretical approach
1980
A Comparison Study on Key Exchange-Authentication protocol
International Journal of Computer Applications, 2010
Secured Content Distribution Network Using Optimized RSA
International Journal of Distributed and Parallel systems, 2011
gVault: A Gmail Based Cryptographic Network File System
Lecture Notes in Computer Science, 2007
Advances in Security in Computing and Communications
Advances in Security in Computing and Communications
Discrete Event Dynamic Systems, 2007
From Security Protocols to Systems Security
Lecture Notes in Computer Science, 2005
2021
A Study on Techniques for Access Control and Key Management in the Cloud for Secured Communication
International Journal of Innovations in Engineering and Science
Arcanum: a secure and efficient key exchange protocol for the Internet
International Conference on Information Technology: Coding and Computing, 2004. Proceedings. ITCC 2004., 2004
Related topics
StatisticsInfluencePure MathematicsPowerInformation ContentNestSecret Sharing