Amanote Research
Register
Sign In
Discover open access scientific publications
Search, annotate, share and cite publications
Publications by L. Harn
Threshold Cryptosystem With Multiple Secret Sharing Policies
IEE Proceedings - Computers and Digital Techniques
Related publications
Verifiable Essential Secret Image Sharing With Multiple Decryptions
International Journal of Recent Technology and Engineering
Engineering
Management of Technology
Innovation
A Fair (T,n) Threshold Secret Sharing Scheme
Threshold Cryptography Based on Asmuth-Bloom Secret Sharing
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Designing Robust LMCA-based Threshold Secret Sharing Scheme for Digital Images Using Multiple Configurations Assignment
Journal of Communications Software and Systems
Electronic Engineering
Electrical
Software
Efficient Threshold Password-Authenticated Secret Sharing Protocols for Cloud Computing
Journal of Parallel and Distributed Computing
Computer Networks
Hardware
Communications
Architecture
Theoretical Computer Science
Artificial Intelligence
Software
Geometric Realization of Electronic Elections Based on Threshold Secret Sharing
Vestnik of Don State Technical University
Secret Sharing With Public Reconstruction
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
Secret Sharing With Reusable Polynomials
Lecture Notes in Computer Science
Computer Science
Theoretical Computer Science
An Efficient Threshold Verifiable Multi-Secret Sharing Scheme Using Generalized Jacobian of Elliptic Curves
Algebraic Structures and their Applications
Applied Mathematics
Number Theory
Algebra