Perfect Secret Sharing Schemes on Five Participants
Designs, Codes and Cryptography
A Construction for Multisecret Threshold Schemes
Designs, Codes and Cryptography
A Linear Construction of Secret Sharing Schemes
Designs, Codes and Cryptography
Designs, Codes and Cryptography
Unconditionally Secure Group Authentication
Designs, Codes and Cryptography
Linear Key Predistribution Schemes
Designs, Codes and Cryptography
Detection of Cheaters in Vector Space Secret Sharing Schemes
Designs, Codes and Cryptography
Secret Sharing Schemes with Detection of Cheaters for a General Access Structure
Designs, Codes and Cryptography
Changing Thresholds in the Absence of Secure Channels
ACISP '99 Proceedings of the 4th Australasian Conference on Information Security and Privacy
ISC '01 Proceedings of the 4th International Conference on Information Security
Generation of key predistribution schemes using secret sharing schemes
Discrete Applied Mathematics - Special issue: International workshop on coding and cryptography (WCC 2001)
Shared generation of pseudo-random functions
Journal of Complexity - Special issue on coding and cryptography
A Linear Algebraic Approach to Metering Schemes
Designs, Codes and Cryptography
Secret sharing schemes with three or four minimal qualified subsets
Designs, Codes and Cryptography
A General Approach to Robust Web Metering
Designs, Codes and Cryptography
Distributed Ring Signatures from General Dual Access Structures
Designs, Codes and Cryptography
A Strong Ramp Secret Sharing Scheme Using Matrix Projection
WOWMOM '06 Proceedings of the 2006 International Symposium on on World of Wireless, Mobile and Multimedia Networks
Secret sharing schemes on access structures with intersection number equal to one
Discrete Applied Mathematics
Generalised Cumulative Arrays in Secret Sharing
Designs, Codes and Cryptography
Secret sharing schemes on access structures with intersection number equal to one
Discrete Applied Mathematics
Secret sharing schemes on access structures with intersection number equal to one
SCN'02 Proceedings of the 3rd international conference on Security in communication networks
Authenticated data structures for graph and geometric searching
CT-RSA'03 Proceedings of the 2003 RSA conference on The cryptographers' track
On the optimization of bipartite secret sharing schemes
ICITS'09 Proceedings of the 4th international conference on Information theoretic security
Optimal complexity of secret sharing schemes with four minimal qualified subsets
Designs, Codes and Cryptography
Error-set codes and related objects
COCOON'05 Proceedings of the 11th annual international conference on Computing and Combinatorics
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
Finding lower bounds on the complexity of secret sharing schemes by linear programming
LATIN'10 Proceedings of the 9th Latin American conference on Theoretical Informatics
On codes, matroids and secure multi-party computation from linear secret sharing schemes
CRYPTO'05 Proceedings of the 25th annual international conference on Advances in Cryptology
On the optimization of bipartite secret sharing schemes
Designs, Codes and Cryptography
Finding lower bounds on the complexity of secret sharing schemes by linear programming
Discrete Applied Mathematics
Hi-index | 0.00 |