Results 271 to 280 of about 567,858 (283)
Some of the next articles are maybe not open access.
Two new identity-based threshold ring signature schemes
Theoretical Computer Science, 2014Jiwen Zeng, Lunzhi Deng
exaly
General Secret Sharing Schemes Using Hierarchical Threshold Scheme
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2019openaire +1 more source
Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes
IEEE Transactions on Information Theory, 2007Huaxiong Wang, Josef P Pieprzyk
exaly
Threshold schemes for cryptographic primitives:
2019Luís T.A.N. Brandão +2 more
openaire +1 more source
Kernels with prescribed surface tension & mobility for threshold dynamics schemes
Journal of Computational Physics, 2017Selim Esedoglu, Matt Jacobs
exaly
A Survey of SIP Authentication and Key Agreement Schemes
IEEE Communications Surveys and Tutorials, 2014exaly

