The detection of cheaters in threshold schemes
CRYPTO '88 Proceedings on Advances in cryptology
Distributed fingerprints and secure information dispersal
PODC '93 Proceedings of the twelfth annual ACM symposium on Principles of distributed computing
Size of shares and probability of cheating in threshold schemes
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Conditionally secure secret sharing schemes with disenrollment capability
CCS '94 Proceedings of the 2nd ACM Conference on Computer and communications security
Simplified VSS and fast-track multiparty computations with applications to threshold cryptography
PODC '98 Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing
Three Systems for Threshold Generation of Authenticators
Designs, Codes and Cryptography
Detection of Cheaters in Vector Space Secret Sharing Schemes
Designs, Codes and Cryptography
Secret Sharing Schemes with Detection of Cheaters for a General Access Structure
Designs, Codes and Cryptography
Cheating Immune Secret Sharing
ICICS '01 Proceedings of the Third International Conference on Information and Communications Security
Ideal Threshold Schemes from Orthogonal Arrays
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Protecting General Flexible Itineraries of Mobile Agents
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
CRYPTO '93 Proceedings of the 13th Annual International Cryptology Conference on Advances in Cryptology
t-Cheater Identifiable (k, n) Threshold Secret Sharing Schemes
CRYPTO '95 Proceedings of the 15th Annual International Cryptology Conference on Advances in Cryptology
Secret Sharing Schemes with Detection of Cheaters for a General Access Structure
FCT '99 Proceedings of the 12th International Symposium on Fundamentals of Computation Theory
Cheating Prevention in Linear Secret Sharing
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Farsite: federated, available, and reliable storage for an incompletely trusted environment
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
Responsive Security for Stored Data
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Farsite: federated, available, and reliable storage for an incompletely trusted environment
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Cheating in Visual Cryptography
Designs, Codes and Cryptography
Properties and constraints of cheating-immune secret sharing schemes
Discrete Applied Mathematics - Special issue: Coding and cryptography
A practical verifiable multi-secret sharing scheme
Computer Standards & Interfaces
Robust computational secret sharing and a unified account of classical secret-sharing goals
Proceedings of the 14th ACM conference on Computer and communications security
Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves
Computer Communications
Combiner Driven Management Models and Their Applications
Research in Cryptology
Distortion-free secret image sharing mechanism using modulus operator
Pattern Recognition
Detection and identification of cheaters in (t, n) secret sharing scheme
Designs, Codes and Cryptography
A coding theorem for cheating-detectable (2, 2)-threshold blockwise secret sharing schemes
ISIT'09 Proceedings of the 2009 IEEE international conference on Symposium on Information Theory - Volume 2
Properties and constraints of cheating-immune secret sharing schemes
Discrete Applied Mathematics - Special issue: Coding and cryptography
Optimum secret sharing scheme secure against cheating
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Graph decompositions and secret sharing schemes
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Ideal threshold schemes from MDS codes
ICISC'02 Proceedings of the 5th international conference on Information security and cryptology
Flaws in some secret sharing schemes against cheating
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Efficient (k, n) threshold secret sharing schemes secure against cheating from n - 1 cheaters
ACISP'07 Proceedings of the 12th Australasian conference on Information security and privacy
Detection of algebraic manipulation with applications to robust secret sharing and fuzzy extractors
EUROCRYPT'08 Proceedings of the theory and applications of cryptographic techniques 27th annual international conference on Advances in cryptology
A novel verifiable dynamic multi-policy secret sharing scheme
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
Crypto topics and applications II
Algorithms and theory of computation handbook
Comments on Harn---Lin's cheating detection scheme
Designs, Codes and Cryptography
Almost optimum t-cheater identifiable secret sharing schemes
EUROCRYPT'11 Proceedings of the 30th Annual international conference on Theory and applications of cryptographic techniques: advances in cryptology
Cheater identification on a secret sharing scheme using GCD
ACM Communications in Computer Algebra
Verifiable and lossless distributed media content sharing
UIC'11 Proceedings of the 8th international conference on Ubiquitous intelligence and computing
A simple (v, t, n)-fairness secret sharing scheme with one shadow for each participant
WISM'11 Proceedings of the 2011 international conference on Web information systems and mining - Volume Part I
Almost optimum secret sharing schemes secure against cheating for arbitrary secret distribution
ASIACRYPT'06 Proceedings of the 12th international conference on Theory and Application of Cryptology and Information Security
RFID system with fairness within the framework of security and privacy
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
New methods to construct cheating immune multisecret sharing scheme
CISC'05 Proceedings of the First SKLOIS conference on Information Security and Cryptology
An RFID system based MCLT system with improved privacy
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Cheating immune (2, n)-threshold visual secret sharing
SCN'06 Proceedings of the 5th international conference on Security and Cryptography for Networks
Research note: Cheater identification in (t,n) threshold scheme
Computer Communications
A private online system for executing wills based on a secret sharing mechanism
Security and Communication Networks
AFRICACRYPT'12 Proceedings of the 5th international conference on Cryptology in Africa
DISC'07 Proceedings of the 21st international conference on Distributed Computing
Visual secret sharing with cheating prevention revisited
Digital Signal Processing
Hi-index | 0.00 |