A practical verifiable multi-secret sharing scheme
Computer Standards & Interfaces
An efficient threshold verifiable multi-secret sharing
Computer Standards & Interfaces
New efficient and practical verifiable multi-secret sharing schemes
Information Sciences: an International Journal
Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves
Computer Communications
A secret sharing scheme based on NTRU algorithm
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A novel verifiable dynamic multi-policy secret sharing scheme
ICACT'10 Proceedings of the 12th international conference on Advanced communication technology
A secure and efficient (t, n) threshold verifiable multi-secret sharing scheme
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
RFID system with fairness within the framework of security and privacy
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
An RFID system based MCLT system with improved privacy
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Verifiable multi-secret sharing based on LFSR sequences
Theoretical Computer Science
Hi-index | 0.00 |