Verifiable multi-secret sharing schemes applicable to arbitrary access structures
Verifiable multi-secret sharing on general access structures was studied.A method of construct verifiable se-cret sharing schemes with arbitrary access structure was given.The verifiable multi-secret sharing schemes constructed by this method have the ...
ZHANG Fu-tai1, WANG Yu-min2
doaj +2 more sources
The Resilience Doughnut: The Secret of Strong Kids Bringing Resilience Into the Common Language of Families by Lyn Worsley [PDF]
Tara Gretton
openalex +1 more source
The gluon condensation: a secret hidden in HESSs J1826-130, J1641-463 and J1741-302 [PDF]
Jianhong Ruan, Zechun Zheng, Wei Zhu
openalex
Cycle de conférences publiques 2013/2014 "Secrets de fabriques", coordonné par Elisabeth Essaïan
Pascal Fort
openalex +1 more source
Universal Perturbation-based Secret Key-Controlled Data Hiding [PDF]
Donghua Wang +3 more
openalex +1 more source
Secret Handshakes from CA-Oblivious Encryption [PDF]
Claude Castelluccia +2 more
openalex +1 more source
Review for "Secret lives and gender fluidity of people living with HIV in Hyderabad, India"
Amy Nunn
openalex +1 more source
Elizabeth's Spymaster: Francis Walsingham and the Secret War that Saved England [PDF]
Simon Adams
openalex +1 more source
Eastern chipmunks: secrets of their solitary lives, by Lawrence Wisher [Review]
Keir B. Sterling
openalex +2 more sources

