Results 231 to 240 of about 13,384 (274)
A hybrid multi-node QKD-ECC architecture for securing IoT networks. [PDF]
Chaturvedi R +7 more
europepmc +1 more source
Edge-Enabled Hybrid Encryption Framework for Secure Health Information Exchange in IoT-Based Smart Healthcare Systems. [PDF]
Ghani NA +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
A (t,n) multi-secret sharing scheme
Applied Mathematics and Computation, 2004zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Yang, Chou-Chen +2 more
openaire +2 more sources
Visual multi-secret sharing with friendliness
Journal of Shanghai Jiaotong University (Science), 2014Visual secret sharing (VSS) was used in the literature to encode and decode secret images until visual multi-secret sharing (VMSS) was proposed. Distinctly, multiple secret images can be encoded or decoded at a time in VMSS; however, only one secret image can be done in VSS.
Fuh-gwo Jeng +3 more
openaire +1 more source
Efficient collusion resistant multi-secret image sharing
Multimedia Tools and Applications, 2020Multi-secret image sharing techniques (MSS) extend the secret image sharing schemes. The paper reports a novel MSS scheme designed to be collusion resistant. It starts with a brief introduction of the concept thereafter discussing the related works in the domain. Security is an implicit requirement for MSS techniques.
Kapil Mishra +3 more
openaire +1 more source
Multi-secret sharing threshold access structure
2015 International Conference on Advances in Computing, Communications and Informatics (ICACCI), 2015This paper proposes threshold access structure for multi-secret sharing. It uses a two-level encoding for share generation from multiple secret images. In the first level of encoding secure Boolean based operations are used. The second level of encoding uses Chinese remainder theorem and Lagrange Interpolation. It is mainly useful for secure encryption
L. Siva Reddy, Munaga V. N. K. Prasad
openaire +1 more source
Unconditionally secure multi-secret sharing scheme
2012 IEEE International Conference on Computer Science and Automation Engineering (CSAE), 2012In Shamir's (t, n) secret sharing (SS) scheme, a master secrets is divided into n shares by a dealer and is shared among n shareholders in such a way that any t or more than t shares can reconstruct this master secret; but fewer than t shares cannot obtain any information about the master secret s. Although Shamir's scheme is unconditionally secure, it
Changlu Lin, Lein Harn
openaire +1 more source

