Results 71 to 80 of about 3,153 (99)
A location privacy protection method based on blockchain and threshold cryptography. [PDF]
Hu Z, Jin R, Quan H, Ni S, He P.
europepmc +1 more source
Lightweight signcryption scheme for Securing wearable sensor observed health data sharing in internet of medical things paradigm. [PDF]
Ghazal TM +7 more
europepmc +1 more source
Enhanced security of affine ciphers using digraph transformation and a modified three pass protocol. [PDF]
Bete S +4 more
europepmc +1 more source
Some of the next articles are maybe not open access.
Related searches:
Related searches:
Information Processing Letters, 1998
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
BLUNDO, Carlo +2 more
openaire +2 more sources
zbMATH Open Web Interface contents unavailable due to conflicting licenses.
BLUNDO, Carlo +2 more
openaire +2 more sources
Proactive secret sharing scheme suitable for asymmetric secret sharing scheme
2016 IEEE 5th Global Conference on Consumer Electronics, 2016An asymmetric secret sharing scheme (A-SSS) can set the number of servers at less than k, because it makes up to k-1 shares from one key of the owner of the secret. Therefore, the secret is not revealed even if all the servers are attacked. However, when the owner's key is stolen and attacked, shares may be leaked. Therefore, in this paper we propose a
Naoto Kaneko, Keiichi Iwamura
openaire +1 more source
Probability of shares in secret sharing schemes
Information Processing Letters, 1999zbMATH Open Web Interface contents unavailable due to conflicting licenses.
BLUNDO, Carlo +2 more
openaire +2 more sources
Ideal Secret Sharing Schemes with Multiple Secrets
Journal of Cryptology, 1996zbMATH Open Web Interface contents unavailable due to conflicting licenses.
Jackson, W.A., Martin, K., O'Keefe, C.
openaire +3 more sources
A Molecular Secret Sharing Scheme
Angewandte Chemie, 2018AbstractA method for implementing a secret sharing scheme at the molecular level is presented. By creating molecular code generators that are self‐assembled from several molecular components, we established a means for distributing distinct code‐activating elements among several participants.
Omer Lustgarten +3 more
openaire +2 more sources

