From post

Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters.

, , , , и . ICISS, том 11281 из Lecture Notes in Computer Science, стр. 171-188. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Proactive visual cryptographic schemes for general access structures., , , и . Multim. Tools Appl., 82 (27): 41987-42019 (ноября 2023)Practical attacks on a class of secret image sharing schemes based on Chinese Remainder Theorem., , и . Comput. Electr. Eng., (2022)XOR Based Non-monotone t- (k, n)^* -Visual Cryptographic Schemes Using Linear Algebra., и . ICICS, том 8958 из Lecture Notes in Computer Science, стр. 230-242. Springer, (2014)Secret Sharing Schemes on Compartmental Access Structure in Presence of Cheaters., , , , и . ICISS, том 11281 из Lecture Notes in Computer Science, стр. 171-188. Springer, (2018)Deniable Secret Handshake Protocol - Revisited., , и . AINA, том 926 из Advances in Intelligent Systems and Computing, стр. 1266-1278. Springer, (2019)Color Visual Cryptography Schemes Using Linear Algebraic Techniques over Rings., , , , и . ICISS, том 12553 из Lecture Notes in Computer Science, стр. 198-217. Springer, (2020)Evolving Perfect Hash Families: A Combinatorial Viewpoint of Evolving Secret Sharing., , и . CANS, том 11829 из Lecture Notes in Computer Science, стр. 291-307. Springer, (2019)AC0 Constructions of Secret Sharing Schemes - Accommodating New Parties., , и . NSS, том 12570 из Lecture Notes in Computer Science, стр. 292-308. Springer, (2020)Verifiable E-Voting with Resistance against Physical Forced Abstention Attack., и . IWBIS, стр. 85-90. IEEE, (2019)3-Party Adversarial Cryptography., , и . EIDWT, том 47 из Lecture Notes on Data Engineering and Communications Technologies, стр. 247-258. Springer, (2020)