Results 271 to 280 of about 1,111,411 (282)
Some of the next articles are maybe not open access.
New nonrepudiable threshold proxy signature scheme with known signers
Journal of Systems and Software, 2001Chien-Lung Hsu
exaly
A new threshold scheme and its application in designing the conference key distribution cryptosystem
Information Processing Letters, 1989Lein Harn
exaly
General Secret Sharing Schemes Using Hierarchical Threshold Scheme
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2019openaire +1 more source
Output-Threshold Multiple-Relay-Selection Scheme for Cooperative Wireless Networks
IEEE Transactions on Vehicular Technology, 2010Gayan Amarasuriya +2 more
exaly
Threshold schemes for cryptographic primitives:
2019Luís T.A.N. Brandão +2 more
openaire +1 more source
A Fast (k,L,n)-Threshold Ramp Secret Sharing Scheme
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2009Jun Kurihara, Kazuhide Fukushima
exaly
An efficient nonrepudiable threshold proxy signature scheme with known signers
Computer Communications, 1999exaly

