Results 21 to 26 of about 31 (26)

AUTHENTICATED MULTIPLE KEY DISTRIBUTION USING SIMPLE CONTINUED FRACTION

open access: yes, 2013
S. Srinivasan   +2 more
semanticscholar   +1 more source
Some of the next articles are maybe not open access.

Related searches:

On Threshold secret sharing schemes with primary classes

Advanced Studies: Euro-Tbilisi Mathematical Journal
The aim of this paper is to study some specific classes of Threshold schemes. Our study is based on modular arithmetic and equivalence classes modulo a prime number. For this purpose we construct a secret sharing scheme by using these classes.
C. Ozel, H. Zekraoui
semanticscholar   +1 more source

Remarks on the Classical Threshold Secret Sharing Schemes

Fundamenta Informaticae, 2012
S. Spiez, M. Srebrny, J. Urbanowicz
semanticscholar   +1 more source

Home - About - Disclaimer - Privacy