AbstractOne issue which is essential for the security of calculations and communication as well as the ability to guarantee data confidentiality is intelligent threshold division of strategic information that may later be passed on to a group of authorized users for reconstruction and shared use. Enabling such division of information acquires particular significance with regard to the management of important and confidential data by various national institutions, corporations or strategic (military) units. It seems that these techniques will become increasingly more important along with the growing number of their applications. The division of confidential information is inevitably related to the cryptographic algorithms of the division of ...
Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014Internatio...
This paper proposes a new form of data communication that is similar to slang in human language. Usi...
AbstractThis paper studies the methods for changing thresholds in the absence of secure channels aft...
AbstractOne issue which is essential for the security of calculations and communication as well as t...
AbstractThis publication discusses new opportunities for creating threshold schemes for secret shari...
Advanced information security aspects concern the protection and encryption of secure, strategic and...
W niniejszej pracy zostanie zaprezentowane nowe podejście do tworzenia schematów progowych współdzie...
Ankara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilk...
A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) wh...
Secret sharing (SS) is a cryptographic method proposed independently by Adi Shamir and George Blakle...
This dissertation discusses the use of secret sharing cryptographic protocols for distributing and s...
Part 2: 4th International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIH...
Abstract - Secret Sharing is a cryptography algorithm. This technique divides secret data into multi...
Cryptology is the scientific study and practice of making (cryptography) and breaking (cryptanalysis...
AbstractSecret sharing is an important concept for implementing robust and secure computer systems. ...
Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014Internatio...
This paper proposes a new form of data communication that is similar to slang in human language. Usi...
AbstractThis paper studies the methods for changing thresholds in the absence of secure channels aft...
AbstractOne issue which is essential for the security of calculations and communication as well as t...
AbstractThis publication discusses new opportunities for creating threshold schemes for secret shari...
Advanced information security aspects concern the protection and encryption of secure, strategic and...
W niniejszej pracy zostanie zaprezentowane nowe podejście do tworzenia schematów progowych współdzie...
Ankara : The Department of Computer Engineering and the Institute of Engineering and Science of Bilk...
A secret sharing scheme starts with a secret and then derives from it certain shares (or shadows) wh...
Secret sharing (SS) is a cryptographic method proposed independently by Adi Shamir and George Blakle...
This dissertation discusses the use of secret sharing cryptographic protocols for distributing and s...
Part 2: 4th International Workshop on Security and Cognitive Informatics for Homeland Defense (SeCIH...
Abstract - Secret Sharing is a cryptography algorithm. This technique divides secret data into multi...
Cryptology is the scientific study and practice of making (cryptography) and breaking (cryptanalysis...
AbstractSecret sharing is an important concept for implementing robust and secure computer systems. ...
Part 2: The 2014 Asian Conference on Availability, Reliability and Security, AsiaARES 2014Internatio...
This paper proposes a new form of data communication that is similar to slang in human language. Usi...
AbstractThis paper studies the methods for changing thresholds in the absence of secure channels aft...