Suggested Topics within your search.
Suggested Topics within your search.
1
Published 2013
Table of Contents: ';
“... -- Count-min sketches for estimating password frequency with Hamming Distance -- Secret sharing -- A...”Get full text
Electronic
2
Published 2013
Table of Contents: ';
“... cryptanalysis -- Key exchange and secret sharing -- Efficient implementation and hardware.-℗ Coding theory...”View fulltext via EzAccess
Electronic
3
Published 2013
Table of Contents: ';
“... and Secret Sharing -- Signatures and Authentication -- Quantum Security -- New Primitives -- Functional...”Get full text
Electronic
4
by Tilborg, Henk C. A. van.
Published 2002
Table of Contents: ';
“... & Authentication Techniques -- Zero Knowledge Protocols -- Secret Sharing Systems....”Published 2002
View fulltext via EzAccess
Electronic
5
Published 2013
Table of Contents: ';
“... Secret Sharing with Minimum Share Size -- A Scalable Scheme for Privacy-Preserving Aggregation of Time...”Get full text
Electronic
6
7
8
9
10
11
12
13
Published 2013
Table of Contents: ';
“... of Shamir<U+0019>s Secret Sharing against Side-Channel Analysis -- Secure Multiple SBoxes Implementation...”Get full text
Electronic
14
Published 2013
Table of Contents: ';
“...New Protocols and Lower Bounds for Quantum Secret Sharing with Graph States -- A Quantum Protocol...”Get full text
Electronic
15
Published 2013
Table of Contents: ';
“... Secret Sharing with Graph States -- Testing Embedded Memories: A Survey -- Quicksort and Large Deviations...”Get full text
Electronic
16
Published 2013
Table of Contents: ';
“... -- Security Protocols -- On Cheater Identifiable Secret Sharing Schemes Secure against Rushing Adversary...”View fulltext via EzAccess
Electronic
17
Published 2010
Table of Contents: ';
“... Uncertainty -- Distributed Secret Sharing over the Gaussian Interference Wiretap Channel -- Cooperative...”Get full text
Electronic
18
Published 2013
Table of Contents: ';
“... Hierarchical Key Assignment Scheme -- Traitor-Traceable Key Pre-distribution Based on Visual Secret Sharing...”View fulltext via EzAccess
Electronic
19
Published 2009
Table of Contents: ';
“...-Hellman key exchange protocol in finite groups -- 11. Design of a Secret Sharing Scheme with a Generic k...”View fulltext via EzAccess
Electronic
20
Published 2013
Table of Contents: ';
“... for Network Security Situational Awareness -- Security and Quantum Communications Quantum Secret Sharing Based...”View fulltext via EzAccess
Electronic