Prepositioned shared secret and/or shared control schemes
EUROCRYPT '89 Proceedings of the workshop on the theory and application of cryptographic techniques on Advances in cryptology
On sharing secrets and Reed-Solomon codes
Communications of the ACM
How to (Really) Share a Secret
CRYPTO '88 Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology
A software authentication system for the prevention of computer viruses
CSC '92 Proceedings of the 1992 ACM annual conference on Communications
Verifiable secret sharing for monotone access structures
CCS '93 Proceedings of the 1st ACM conference on Computer and communications security
The consequences of trust in shared secret schemes
EUROCRYPT '93 Workshop on the theory and application of cryptographic techniques on Advances in cryptology
Forward-Secure Threshold Signature Schemes
CT-RSA 2001 Proceedings of the 2001 Conference on Topics in Cryptology: The Cryptographer's Track at RSA
Robust Key-Evolving Public Key Encryption Schemes
ICICS '02 Proceedings of the 4th International Conference on Information and Communications Security
Unconditionally Secure Proactive Secret Sharing Scheme with Combinatorial Structures
SAC '99 Proceedings of the 6th Annual International Workshop on Selected Areas in Cryptography
Community Formation via a Distributed, Privacy-Protecting Matchmaking System
Community Computing and Support Systems, Social Interaction in Networked Communities [the book is based on the Kyoto Meeting on Social Interaction and Communityware, held in Kyoto, Japan, in June 1998]
Geometric Shared Secret and/or Shared Control Schemes
CRYPTO '90 Proceedings of the 10th Annual International Cryptology Conference on Advances in Cryptology
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
CRYPTO '91 Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology
Shared Generation of Random Number with Timestamp: How to Cope with the Leakage of the CA's Secret
PKC '99 Proceedings of the Second International Workshop on Practice and Theory in Public Key Cryptography
Robust Forward-Secure Signature Schemes with Proactive Security
PKC '01 Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography
Efficient Multi-authorizer Accredited Symmetrically Private Information Retrieval
ICICS '08 Proceedings of the 10th International Conference on Information and Communications Security
A Verifiable Secret Sharing Scheme Based on the Chinese Remainder Theorem
INDOCRYPT '08 Proceedings of the 9th International Conference on Cryptology in India: Progress in Cryptology
New voter verification scheme using pre-encrypted ballots
Computer Communications
A threshold cryptosystem without a trusted party
EUROCRYPT'91 Proceedings of the 10th annual international conference on Theory and application of cryptographic techniques
Graph decompositions and secret sharing schemes
EUROCRYPT'92 Proceedings of the 11th annual international conference on Theory and application of cryptographic techniques
Efficient secret sharing without a mutually trusted authority
EUROCRYPT'95 Proceedings of the 14th annual international conference on Theory and application of cryptographic techniques
A method for sending confidential messages to a group without trusted parties
ISPA'03 Proceedings of the 2003 international conference on Parallel and distributed processing and applications
Strong (n,t,n) verifiable secret sharing scheme
Information Sciences: an International Journal
Sharing a quantum secret without a trusted party
Quantum Information Processing
Cryptovirology: extortion-based security threats and countermeasures
SP'96 Proceedings of the 1996 IEEE conference on Security and privacy
Context-Enhanced authentication for infrastructureless network environments
UIC'06 Proceedings of the Third international conference on Ubiquitous Intelligence and Computing
Efficient (n, t, n) secret sharing schemes
Journal of Systems and Software
Research note: Threshold signature schemes with traceable signers in group communications
Computer Communications
Hi-index | 0.00 |