Results 41 to 50 of about 116 (50)

Probabilistic Infinite Secret Sharing

open access: yes, 2013
The study of probabilistic secret sharing schemes using arbitrary probability spaces and possibly infinite number of participants lets us investigate abstract properties of such schemes.
Csirmaz, László
core  

Stream cipher based on quasigroup string transformations in $Z_p^*$

open access: yes, 2004
In this paper we design a stream cipher that uses the algebraic structure of the multiplicative group $\bbbz_p^*$ (where p is a big prime number used in ElGamal algorithm), by defining a quasigroup of order $p-1$ and by doing quasigroup string ...
Gligoroski, Danilo
core   +1 more source

A New Watermarking Algorithm Based on Human Visual System for Content Integrity Verification of Region of Interest [PDF]

open access: yes, 2012
This paper proposes a semi-fragile, robust-to-JPEG2000 compression watermarking method which is based on the Human Visual System (HVS). This method is designed to verify the content integrity of Region of Interest (ROI) in tele-radiology images.
Fatemizadeh, Emad, Maneshi, Mona
core   +1 more source

How to share secrets simultaneously [PDF]

open access: yes, 2011
Each member of a team consisting of $n$ person has a secret. The $k$ out of $n$ simultaneous threshold secret sharing requires that any group of $k$ members should be able to recover the secret of the other $n-k$ members, while any group of $k-1$ or less
Laszlo Csirmaz
core  

Sum graph based access structure in a secret sharing scheme [PDF]

open access: yes
Secret sharing scheme is a method to distribute secret information to a set P of participants so that only authorised subsets of P can reconstruct the secret.
Miller, Mirka   +2 more
core   +1 more source

Home - About - Disclaimer - Privacy