Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("Secret")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 77851

  • Page / 3115
Export

Selection :

  • and

On secret set schemesDE SANTIS, A; MASUCCI, B.Information processing letters. 2000, Vol 74, Num 5-6, pp 243-251, issn 0020-0190Article

El manejo del secreto profesional con pacientes de SIDALLANO, A.Theologica Xaveriana. 1991, Vol 41, Num 98, pp 81-98Article

Efficient sharing (broadcasting) of multiple secretsHARN, L.IEE proceedings. Computers and digital techniques. 1995, Vol 142, Num 3, pp 237-240, issn 1350-2387Article

La intelegencia como actividad del Estado = Les services secrets en tant qu'activité de l'EtatGAMBIER, B; ZUBIAUR, C.Revista de administración pública (Madrid). 1993, Num 131, pp 529-554, issn 0034-7639Article

A new (t,n) multi-secret sharing scheme based on Shamir's secret sharingPANG, Liao-Jun; WANG, Yu-Min.Applied mathematics and computation. 2005, Vol 167, Num 2, pp 840-848, issn 0096-3003, 9 p.Article

Natural Generalizations of Threshold Secret SharingFARRAS, Oriol; PADRO, Carles; CHAOPING XING et al.IEEE transactions on information theory. 2014, Vol 60, Num 3, pp 1652-1664, issn 0018-9448, 13 p.Conference Paper

Ideal Hierarchical Secret Sharing SchemesFARRAS, Oriol; PADRO, Carles.IEEE transactions on information theory. 2012, Vol 58, Num 5, pp 3273-3286, issn 0018-9448, 14 p.Article

Symbol, Myth, and RitualJACOPIN, P.-Y.Reviews in Anthropology. 1990, Vol 14, Num 4, pp 305-312Article

Sharing one secret vs. Sharing many secrets: Tight bounds for the max improvement ratioDI CRESCENZO, Giovanni.Lecture notes in computer science. 2001, pp 292-303, issn 0302-9743, isbn 3-540-42496-2Conference Paper

PHOTOGRAPHIER L'INITIATION ARAKUÁ: SECRET ET MISE EN SCÈNE = TAKING PICTURES OF THE ARAKUA INITIATION: SECRET AND STAGINGMOREL-BARO, Géraldine.Tsantsa (Bern). 2010, Num 15, pp 72-86, issn 1420-7834, 15 p.Article

Narrative Conscience and the Autoethnographic Adventure : Probing Memories, Secrets, Shadows, and PossibilitiesPOULOS, Christopher N.Qualitative inquiry. 2008, Vol 14, Num 1, pp 46-66, issn 1077-8004, 21 p.Article

Cheating prevention in linear secret sharingPIEPRZYK, Josef; ZHANG, Xian-Mo.Lecture notes in computer science. 2002, pp 121-135, issn 0302-9743, isbn 3-540-43861-0, 15 p.Conference Paper

Le secret professionnel : une règle d'or pour tous les soignantsSociologie du travail. 1995, Num 35, pp 16-17, issn 0038-0296Article

A propos d'un avatar d'une enquête sociologique, le recours au secret professionnelLE PENNEC, J.-J.Sociologie de la santé. 1990, Num 2, pp 25-40Article

Le sentier occulte : Figures de l'initiation et du secret dons l'extrême-droite française : Réligiosités et initiations = Figure of initiation and secret in French far rightREYNES, Alexondre.Sociétés (Paris). 2006, Num 92, pp 61-76, issn 0765-3697, 16 p.Article

The experiences of christians during the underground years and thereafterNOSCO, Peter.Japanese journal of religious studies. 2007, Vol 34, Num 1, pp 85-97, issn 0304-1042, 13 p.Article

Le secret professionnel : une règle d'or pour tous les soignantsSociologie du travail. 1995, Num 35, pp 16-17, issn 0038-0296Article

Security analysis and improvement of two verifiable multi-secret sharing schemesJIA YU; RONG HAO; XIANGGUO CHENG et al.International journal of security and networks (Print). 2013, Vol 8, Num 4, pp 200-206, issn 1747-8405, 7 p.Article

Secret sharing schemes on access structures with intersection number equal to oneMARTI-FARRE, Jaume; PADRO, Carles.Lecture notes in computer science. 2003, pp 354-363, issn 0302-9743, isbn 3-540-00420-3, 10 p.Conference Paper

Ideal secret sharing schemes with multiple secretsJACKSON, W.-A; MARTIN, K. M; O'KEEFE, C. M et al.Journal of cryptology. 1996, Vol 9, Num 4, pp 233-250, issn 0933-2790Article

V-fairness (t, n) secret sharing schemeLAIH, C.-S; LEE, Y.-C.IEE proceedings. Computers and digital techniques. 1997, Vol 144, Num 4, pp 245-248, issn 1350-2387Article

A general multi-secret visual cryptography schemeYANG, Ching-Nung; CHUNG, Ting-Hao.Optics communications. 2010, Vol 283, Num 24, pp 4949-4962, issn 0030-4018, 14 p.Article

A Geometry-Based Secret Image Sharing ApproachCHEN, Chien-Chang; FU, Wen-Yin.Journal of information science and engineering. 2008, Vol 24, Num 5, pp 1567-1577, issn 1016-2364, 11 p.Article

Rearrangements of access structures and their realizations in secret sharing schemesZHIFANG ZHANG; MULAN LIU; LIANGLIANG XIAO et al.Discrete mathematics. 2008, Vol 308, Num 21, pp 4882-4891, issn 0012-365X, 10 p.Conference Paper

Secret key capacity for optimally correlated sources under sampling attackMURAMATSU, Jun; YOSHIMURA, Kazuyuki; ARAI, Kenichi et al.IEEE transactions on information theory. 2006, Vol 52, Num 11, pp 5140-5151, issn 0018-9448, 12 p.Article

  • Page / 3115