Scalable threshold scheme without a trusted third party
ICCC '02 Proceedings of the 15th international conference on Computer communication
Robust computational secret sharing and a unified account of classical secret-sharing goals
Proceedings of the 14th ACM conference on Computer and communications security
Combiner Driven Management Models and Their Applications
Research in Cryptology
A method for sending confidential messages to a group without trusted parties
ISPA'03 Proceedings of the 2003 international conference on Parallel and distributed processing and applications
Space efficient secret sharing for implicit data security
Information Sciences: an International Journal
Middleware for a re-configurable distributed archival store based on secret sharing
Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware
Ideal secret sharing schemes with share selectability
ICICS'11 Proceedings of the 13th international conference on Information and communications security
RFID system with fairness within the framework of security and privacy
ESAS'05 Proceedings of the Second European conference on Security and Privacy in Ad-Hoc and Sensor Networks
An RFID system based MCLT system with improved privacy
EUC'06 Proceedings of the 2006 international conference on Emerging Directions in Embedded and Ubiquitous Computing
Designs, Codes and Cryptography
Research note: An on-line secret sharing scheme for multi-secrets
Computer Communications
Sharing many secrets with computational provable security
Information Processing Letters
Hi-index | 0.00 |