Amanote Research

Amanote Research

    RegisterSign In

Dependable Security by Twisted Secret Sharing

doi 10.1007/1-4020-8143-x_13
Full Text
Open PDF
Abstract

Available in full text

Date

January 1, 2004

Authors
Semir Daskapan
Publisher

Springer US


Related search

Sharing of a Digital Secret Image by Diverse Media for More Security

International Journal of Computer Applications
2017English

A Publicly Verifiable Dynamic Secret Sharing Protocol for Secure and Dependable Data Storage in Cloud Computing

International Journal of Cloud Applications and Computing
2012English

Security of a Kind of Quantum Secret Sharing With Entangled States

Scientific Reports
Multidisciplinary
2017English

A Python Based Approach to Enhance Security Using Secret Sharing Scheme

International Journal of Computer Applications
2014English

Rational Secret Sharing Over an Asynchronous Broadcast Channel With Information Theoretic Security

International Journal of Network Security & Its Applications
2011English

Non-Malleable Secret Sharing

2018English

Encrypted Secret Sharing and Analysis by Plaintext Randomization

Lecture Notes in Computer Science
Computer ScienceTheoretical Computer Science
2015English

Protecting Bus-Based Hardware IP by Secret Sharing

2008English

Secret Sharing Using Meaningful Images

Journal of Advanced Management Science
2013English

Amanote Research

Note-taking for researchers

Follow Amanote

© 2025 Amaplex Software S.P.R.L. All rights reserved.

Privacy PolicyRefund Policy