From post

Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness.

, , , , , , и . ISPEC, том 11125 из Lecture Notes in Computer Science, стр. 578-594. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Satellite Based Fraction of Absorbed Photosynthetically Active Radiation Is Congruent with Plant Diversity in India., , , , , и . Remote. Sens., 13 (2): 159 (2021)Collusion-resistant identity-based Proxy Re-encryption: Lattice-based constructions in Standard Model., , , и . Theor. Comput. Sci., (2021)One-sided leakage-resilient privacy only two-message oblivious transfer., и . J. Inf. Secur. Appl., 19 (4-5): 295-300 (2014)Platform Interactions and Emergence of an Organizational Field: Case Study on Ola., и . Australas. J. Inf. Syst., (2019)Identity-Based Unidirectional Proxy Re-encryption in Standard Model: A Lattice-Based Construction., , , , и . WISA, том 12583 из Lecture Notes in Computer Science, стр. 245-257. Springer, (2020)Password Protected Secret Sharing from Lattices., , , и . ACNS (1), том 12726 из Lecture Notes in Computer Science, стр. 442-459. Springer, (2021)Secret Sharing on Evolving Multi-level Access Structure., , , , и . WISA, том 11897 из Lecture Notes in Computer Science, стр. 180-191. Springer, (2019)Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness., , , , , , и . ISPEC, том 11125 из Lecture Notes in Computer Science, стр. 578-594. Springer, (2018)A Lattice-Based Public Key Encryption with Equality Test in Standard Model., , , , и . ACISP, том 11547 из Lecture Notes in Computer Science, стр. 138-155. Springer, (2019)On the Robustness of Visual Cryptographic Schemes., , , и . IWDW, том 10082 из Lecture Notes in Computer Science, стр. 251-262. (2016)