Pascal and Francis Bibliographic Databases

Help

Search results

Your search

kw.\*:("secret")

Filter

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Document Type [dt]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Publication Year[py]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Discipline (document) [di]

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Language

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Author Country

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Origin

A-Z Z-A Frequency ↓ Frequency ↑
Export in CSV

Results 1 to 25 of 51929

  • Page / 2078
Export

Selection :

  • and

Ideal Hierarchical Secret Sharing SchemesFARRAS, Oriol; PADRO, Carles.IEEE transactions on information theory. 2012, Vol 58, Num 5, pp 3273-3286, issn 0018-9448, 14 p.Article

Natural Generalizations of Threshold Secret SharingFARRAS, Oriol; PADRO, Carles; CHAOPING XING et al.IEEE transactions on information theory. 2014, Vol 60, Num 3, pp 1652-1664, issn 0018-9448, 13 p.Conference Paper

Cheating prevention in linear secret sharingPIEPRZYK, Josef; ZHANG, Xian-Mo.Lecture notes in computer science. 2002, pp 121-135, issn 0302-9743, isbn 3-540-43861-0, 15 p.Conference Paper

The accessibility of an access structureCARRERAS, Francesc; MAGANA, Antonio; MUNUERA, Carlo et al.Informatique théorique et applications (Imprimé). 2006, Vol 40, Num 4, pp 559-567, issn 0988-3754, 9 p.Article

Soins en milieu carcéral et éthique : Soin et milieu carcéral = Ethical considérations on health care in prisonsBARLET, P.Ethique & santé (Imprimé). 2006, Vol 3, Num 3, pp 161-167, issn 1765-4629, 7 p.Article

Threshold construction from specific cases in visual cryptography without the pixel expansionXUEHU YAN; SHEN WANG; XIAMU NIU et al.Signal processing. 2014, Vol 105, pp 389-398, issn 0165-1684, 10 p.Article

Property Analysis of XOR-Based Visual CryptographyYANG, Ching-Nung; WANG, Dao-Shun.IEEE transactions on circuits and systems for video technology. 2014, Vol 24, Num 2, pp 189-197, issn 1051-8215, 9 p.Article

Visual secret sharing for multiple secretsFENG, Jen-Bang; WU, Hsien-Chu; TSAI, Chwei-Shyong et al.Pattern recognition. 2008, Vol 41, Num 12, pp 3572-3581, issn 0031-3203, 10 p.Article

Multiple assignment scheme for sharing secretITO, M; SAITO, A; NISHIZEKI, T et al.Journal of cryptology. 1993, Vol 6, Num 1, pp 15-20, issn 0933-2790Article

A new multi-stage secret sharing scheme using one-way functionCHANG, Ting-Yi; HWANG, Min-Shiang; YANG, Wei-Pang et al.Operating systems review. 2005, Vol 39, Num 1, pp 48-55, issn 0163-5980, 8 p.Article

A general formula of the (t, n)-threshold visual secret sharing schemeKOGA, Hiroki.Lecture notes in computer science. 2002, pp 328-345, issn 0302-9743, isbn 3-540-00171-9, 18 p.Conference Paper

Secret Sharing and Non-Shannon Information InequalitiesBEIMEL, Amos; ORLOV, Ilan.IEEE transactions on information theory. 2011, Vol 57, Num 9, pp 5634-5649, issn 0018-9448, 16 p.Article

A new efficient (t,n) verifiable multi-secret sharing (VMSS) based on YCH schemeJUN SHAO; ZHENFU CAO.Applied mathematics and computation. 2005, Vol 168, Num 1, pp 135-140, issn 0096-3003, 6 p.Article

Le secret bancaireDEPRET, H. R; DEKLERCK, L.1991, 79 p., isbn 2-9300-1403-2Book

Sharing one secret vs. Sharing many secrets: Tight bounds for the max improvement ratioDI CRESCENZO, Giovanni.Lecture notes in computer science. 2001, pp 292-303, issn 0302-9743, isbn 3-540-42496-2Conference Paper

Multistage secret sharing based on one-way functionHE, J; DAWSON, E.Electronics Letters. 1994, Vol 30, Num 19, pp 1591-1592, issn 0013-5194Article

Efficient sharing (broadcasting) of multiple secretsHARN, L.IEE proceedings. Computers and digital techniques. 1995, Vol 142, Num 3, pp 237-240, issn 1350-2387Article

La intelegencia como actividad del Estado = Les services secrets en tant qu'activité de l'EtatGAMBIER, B; ZUBIAUR, C.Revista de administración pública (Madrid). 1993, Num 131, pp 529-554, issn 0034-7639Article

Ideal Multipartite Secret Sharing SchemesFARRAS, Oriol; MARTI-FARRE, Jaume; PADRO, Carles et al.Journal of cryptology. 2012, Vol 25, Num 3, pp 434-463, issn 0933-2790, 30 p.Article

LA MESURE D'UNE DIFFICILE SINCÉRITÉ: RACHEL BESPALOFF LECTRICE ET JUGE DE KIERKEGAARD : SOREN KIERKEGAARD, LA TÂCHE ET L' ART D'ECRIRE = The measure of a difficult sincerity. Rachel Bespaloff as reader and judge of KierkegaardMESSAGE, Jacques.Revue des sciences philosophiques et théologiques. 2009, Vol 93, Num 3, pp 515-531, issn 0035-2209, 17 p.Article

Secret sharing schemes on access structures with intersection number equal to oneMARTI-FARRE, Jaume; PADRO, Carles.Lecture notes in computer science. 2003, pp 354-363, issn 0302-9743, isbn 3-540-00420-3, 10 p.Conference Paper

Ideal secret sharing schemes with multiple secretsJACKSON, W.-A; MARTIN, K. M; O'KEEFE, C. M et al.Journal of cryptology. 1996, Vol 9, Num 4, pp 233-250, issn 0933-2790Article

An Improved Efficient Secret Handshakes Scheme with UnlinkabilityJIE GU; ZHI XUE.IEEE communications letters. 2011, Vol 15, Num 2, pp 259-261, issn 1089-7798, 3 p.Article

L'assouplissement du régime juridique de la cryptologieMEILLAN, E.Cahiers Lamy du Droit de l'Informatique. 1992, Num 38, pp I-IIIArticle

Bounds on the Threshold Gap in Secret Sharing and its ApplicationsCASCUDO, Ignacio; CRAMER, Ronald; CHAOPING XING et al.IEEE transactions on information theory. 2013, Vol 59, Num 9, pp 5600-5612, issn 0018-9448, 13 p.Article

  • Page / 2078