Author of the publication

A New (k, n)-Threshold Secret Sharing Scheme and Its Extension.

, , , and . ISC, volume 5222 of Lecture Notes in Computer Science, page 455-470. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Resource Authorization Methods for Edge Computing., , and . AINA (1), volume 449 of Lecture Notes in Networks and Systems, page 167-179. Springer, (2022)Towards the NFVI-Assisted ICN: Integrating ICN Forwarding into the Virtualization Infrastructure., , , and . GLOBECOM, page 1-6. IEEE, (2016)A Performance Analysis of End-to-End Fragmentation in Content-Centric Networking., , , and . MASS, page 531-536. IEEE Computer Society, (2015)On a Construction of Stream-cipher-based Hash Functions., , , and . SECRYPT, page 334-343. SciTePress, (2010)An encryption-based access control framework for content-centric networking., , and . Networking, page 1-9. IEEE Computer Society, (2015)List Interest: Packing Interests for Reduction of Router Workload in CCN 1.0., , , and . MASS, page 500-505. IEEE Computer Society, (2015)New parameters of linear codes expressing security performance of universal secure network coding., , and . Allerton Conference, page 533-540. IEEE, (2012)A Fast (k, L, n)-Threshold Ramp Secret Sharing Scheme., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 92-A (8): 1808-1821 (2009)Virtual Vault: A Practical Leakage Resilient Scheme Using Space-Hard Ciphers., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 104-A (1): 182-189 (2021)A New (k, n)-Threshold Secret Sharing Scheme and Its Extension., , , and . ISC, volume 5222 of Lecture Notes in Computer Science, page 455-470. Springer, (2008)