Results 271 to 280 of about 40,010 (281)
Some of the next articles are maybe not open access.
Auditory Cryptography (k, n) threshold Watermarking Algorithm
International Journal of Digital Content Technology and its Applications, 2011Huan Li - +3 more
openaire +1 more source
A survey of applications of threshold cryptography—proposed and practiced
Information Security Journal, 2016Vishnu Venukumar, Vinod Pathari
exaly
Threshold cryptography in P2P and MANETs: The case of access control
Computer Networks, 2007Nitesh Saxena +2 more
exaly
A Novel Threshold Cryptography with Membership Authentication and Key Establishment
Wireless Personal Communications, 2017Ching-Fang Hsu, Lein Harn
exaly
Post-Quantum Lattice-Based Cryptography Implementations
ACM Computing Surveys, 2019Hamid Nejatollahi +2 more
exaly
Practical threshold elliptic curve cryptography from native assumptions
2023openaire +1 more source
A Simulated Annealing Algorithm for General Threshold Visual Cryptography Schemes
IEEE Transactions on Information Forensics and Security, 2011exaly

