Results 271 to 280 of about 567,858 (283)
Some of the next articles are maybe not open access.

Two new identity-based threshold ring signature schemes

Theoretical Computer Science, 2014
Jiwen Zeng, Lunzhi Deng
exaly  

Corrections to and Comments on “Throughput and Optimal Threshold for FFR Schemes in OFDMA Cellular Networks” [Aug 12 2776-2785]

IEEE Transactions on Wireless Communications, 2015
Guillem Femenias, Felip Riera-Palou
exaly  

General Secret Sharing Schemes Using Hierarchical Threshold Scheme

IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, 2019
openaire   +1 more source

Lattice-Based Threshold Changeability for Standard Shamir Secret-Sharing Schemes

IEEE Transactions on Information Theory, 2007
Huaxiong Wang, Josef P Pieprzyk
exaly  

BUFFing Threshold Signature Schemes

Marc Fischlin   +2 more
openaire   +1 more source

Threshold schemes for cryptographic primitives:

2019
Luís T.A.N. Brandão   +2 more
openaire   +1 more source

Kernels with prescribed surface tension & mobility for threshold dynamics schemes

Journal of Computational Physics, 2017
Selim Esedoglu, Matt Jacobs
exaly  

A Survey of SIP Authentication and Key Agreement Schemes

IEEE Communications Surveys and Tutorials, 2014
exaly  

Home - About - Disclaimer - Privacy