Academic Journals Database
Disseminating quality controlled scientific knowledge

Search Articles for "Secret Sharing"

ADD TO MY LIST
 
A Multiple LSPs Approach to Secure Data in MPLS Networks

Author(s): Sahel Alouneh | Abdeslam En-nouaary | Anjali Agarwal
Generalized Mignotte Sequences and Software Watermarking

Author(s): Hedley Morris | Mohammed Eyadat
Ideal Secret Sharing Schemes from Permutations

Author(s): Josef Pieprzyk | Xian-Mo Zhang
A Novel Secret Sharing Technique Using QR Code

Author(s): Jun-Chou Chuang | Yu-Chen Hu | Hsien-Ju Ko
Improved Double Auction Protocol based on a Hybrid Trust Model

Author(s): JungHoon Ha | Jianying Zhou | SangJae Moon
Forward-Secure Multisignature, Threshold Signature and Blind Signature Schemes

Author(s): Jia Yu | Fanyu Kong | Xiangguo Cheng | Rong Hao | Yangkui Chen | Xuliang Li | Guowen Li
Secret Sharing over Fast-Fading MIMO Wiretap Channels

Author(s): Tan F. Wong | Matthieu Bloch | John M. Shea
A Sudoku-based Secret Image Sharing Scheme with Reversibility (Invited Paper)

Author(s): Chin-Chen Chang | Pei-Yu Lin | Zhi Hui Wang | Ming Chu Li
Multiuser-based Gray-level Watermarking Sharing System

Author(s): Bin Luo | Youqing Wu | Jin Tang | Wanli Lv | Wei Gu
A Novel Ideal Contrast Visual Secret Sharing Scheme with Reversing

Author(s): Haibo Zhang | Xiaofei Wang | Youpeng Huang
Secure Iris Authentication Using Visual Cryptography

Author(s): P.S. Revenkar, | Anisa Anjum | W. Z. Gandhare
Secret Sharing and Proactive Renewal of Shares in Hierarchical Groups

Author(s): Ruchira Naskar | Indranil Sengupta
Secure Logging for Irrefutable Administration

Author(s): Paolo Dal Checco | Francesco Bergadano | Davide Cavagnino | Pasquale Andrea Nesta | Michele Miraglia | Pier Luigi Zaccone
Analysis of an Image Secret Sharing Scheme to Identify Cheaters

Author(s): Jung-San LEe | Pei-Yu Lin | Chin-Chen Chang
An Improved Pixel Sieve Method for Visual Cryptography

Author(s): Vaibhav Choudhary | Pravin Kumar | Kishore Kumar | D.S. Singh
Modified Pixel Sieve Method for Visual Cryptography

Author(s): Vaibhav Choudhary, | Kishore Kumar, | Pravin Kumar, | D.S. Singh
A Secret Image Sharing Method Using Integer Wavelet Transform

Author(s): Chin-Pan Huang | Ching-Chung Li
On Cheating Immune Secret Sharing

Author(s): Josef Pieprzyk | Xian-Mo Zhang
Information Flow in Secret Sharing Protocols

Author(s): Elham Kashefi | Damian Markham | Mehdi Mhalla | Simon Perdrix
Securing AODV for MANETs using Message Digest with Secret Key

Author(s): Mr. Kamaljit Lakhtaria | Prof. Bhaskar N. Patel | Mr. Satish G. Prajapati | Dr. N. N. Jani
Improvements in Geometry-Based Secret Image Sharing Approach with Steganography

Author(s): Mustafa Ulutas | Vasif V. Nabiyev | Guzin Ulutas
Dynamic Threshold Cryptosystem without Group Manager

Author(s): Andreas Noack | Stefan Spitz
Editorial

Author(s): Wen Chen | Fei Yu | Chin-Chen Chang | Jiexian Zeng | Guangxue Yue
Publicly Verifiable Secret Sharing Member-join Protocol For Threshold Signatures

Author(s): Jia Yu | Fanyu Kong | Rong Hao | Xuliang Li | Guowen Li
Guest Editorial

Author(s): Antonios Argyriou | Joerg Widmer | Bob Li
Guest Editorial

Author(s): Athanasios V. Vasilakos | Neal N. Xiong | Laurence T. Yang | Chuan Lin | Lei Shu
Visual Cryptography for General Access Structure Using Pixel-block Aware Encoding

Author(s): Haibo Zhang | Xiaofei Wang | Wanhua Cao | Youpeng Huang
Editorial

Author(s): Fei Yu | Chin-Chen Chang | Deng-Yi Zhang | Jie-Xian Zeng | Jun Zhang
Guest Editorial

Author(s): Qi Luo | Ben K. M. Sim | Jun Wang
How not to share a set of secrets

Author(s): K. R. Sahasranand | Nithin Nagaraj | Rajan S.
Design and Analysis of Prototype Hardware for Secret Sharing Using 2-D Image Processing

Author(s): R.Amirtharajan | Dr. R.John Bosco Balaguru | Vivek Ganesan
Integrity of mobile agents: a new approach

Author(s): Aneta Zwierko | Zbigniew Kotulski
An Efficient Probability-based t out of n Secret Image Sharing Scheme

Author(s): Chi-Chen Chang | Yu-Zheng Wang | Chi-Shiang Chan
Color Image Encryption Based on Secret Sharing and Iterations

Author(s): Hao Luo | Fa-Xin Yu | Hui Li | Zheng-Liang Huang
Policy based Decentralized Group key Security for Mobile Ad-hoc Networks

Author(s): Sugandha Singh | Navin Rajpal | Ashok Kale Sharma | Ritu Pahwa
Multiplicative Forward-Secure Threshold Signature Scheme

Author(s): Sherman S. M. Chow | H. W. Go | Lucas C. K. Hui | S. M. Yiu
Application of the Central Encryption System in the Dynamic Secret Sharing Scheme (II)

Author(s): Yulian Shang | Min Feng | Peng Li | Kaiquan Shi
High Performance Certificate Authority Scheme in Manet

Author(s): A.Rajaram and Dr.S.Palaniswami
PVD Blend with Pixel Indicator - OPAP Composite for High Fidelity Steganography

Author(s): R.Amirtharajan | Adharsh.D | Vignesh.V | R.John Bosco Balaguru
An Invisible Communication for Secret Sharing against Transmission Error

Author(s): Rengarajan Amirtharajan | Vivek Ganesan | R Jithamanyu | John Bosco Balaguru Rayappan.
CADS: Co-operative Anti-fraud Data Storage Scheme for Unattended Wireless Sensor Networks

Author(s): Zhiqiang Ruan | Xingming Sun | Wei Liang | Decai Sun | Zhihua Xia
THE MODIFIED SECURITY SCHEME FOR DATA INTEGRITY IN MANET

Author(s): A.Rajaram, | Dr.S.Palaniswami
Ultra Secured and Authentic Key Distribution Protocol using a Novel Secret Sharing Technique

Author(s): Prabir Kr. Naskar | Hari Narayan Khan | Ayan Chaudhuri | Atal Chaudhuri
A Novel Approach for Cheating Prevention Through Visual Cryptographic Analysis

Author(s): Manjunath Gadiparthi | Sridurga Tangirala | Soumya Tatikonda | Swathi Adualla
Constructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing

Author(s): Chunjie Cao | Chao Yang | Jianfeng Ma | Sangjae Moon
A New Repeating Color Watermarking Scheme Based on Human Visual Model

Author(s): Chin-Chen Chang | Chwei-Shyong Tsai
Architecture of Multipath VoIP using Modified Secret Sharing Algorithm

Author(s): K. Maheswari | Dr. M. Punithavalli
Halftone based Secret Sharing Visual Cryptographic Scheme for Color Image using Bit Analysis

Author(s): Pavan Kumar Gupta | Naveen Hemrajani | Savita Shiwani | Ruchi Davey
Efficient Threshold Signature Scheme

Author(s): Sattar J Aboud | Mohammad AL-Fayoumi
Visual cryptography for color images by dithering techniques

Author(s): Lakshmi Priya Tadiboyna | M. Deena Babu
An improved approach for Extended Visual Cryptography Scheme for Colour Images

Author(s): Bhandare Shital | Jhade Manoj | Jadhav Angarika
Enhanced Novel Security Scheme for Wireless Adhoc Networks: ENSS

Author(s): Prasad Patil | Rinku Shah | Kajal Jewani
Secured and Authenticated Sharing of Software Program

Author(s): Madhavi Gangurde | Umashankar prasad | Ranvir Kumar | Prashant Prajapati
Proactive Secret Sharing Scheme for Mobile Ad-hoc Networks

Author(s): Chauhan Gargi K | H. M. Diwanji
A Novel Approach for Cheating Prevention through Visual Cryptographic Analysis

Author(s): Morampudi Naresh kumar | Datrika Srinivas Rao | D.Sravanthi
Secret Sharing over Fast-Fading MIMO Wiretap Channels

Author(s): Wong TanF | Bloch Matthieu | Shea JohnM
A New Repeating Color Watermarking Scheme Based on Human Visual Model

Author(s): Tsai Chwei-Shyong | Chang Chin-Chen
A Secret Image Sharing Method Using Integer Wavelet Transform

Author(s): Huang Chin-Pan | Li Ching-Chung
Constructing UC Secure and Constant-Round Group Key Exchange Protocols via Secret Sharing

Author(s): Cao Chunjie | Yang Chao | Ma Jianfeng | Moon Sangjae
A Receiptfree MultiAuthority EVoting System

Author(s): Adewole A. Philip | Sodiya Adesina Simon | Arowolo Oluremi. A.
Sensitive Data Protection Based on Intrusion Tolerance in Cloud Computing

Author(s): Jingyu Wang | xuefeng Zheng | Dengliang Luo
Efficient Visual Cryptography

Author(s): Supriya A. Kinger
Components Based Key Management Algorithm for Storage Area Networks

Author(s): P. Mahalingam | Dr. N. Jayaprakash | Dr. S. Karthikeyan
Guest Editorial

Author(s): Shiguo Lian | Zhu Li | Stefanos Gritzalis | Xi Chen
A Secret Image Sharing Scheme with High Quality Shadows Based on Exploiting Modification Direction

Author(s): Cheng Guo | Zhi-hui Wang | Chin-Chen Chang | Chuan Qin
Dynamic threshold based Secret Sharing Scheme using polynomial function

Author(s): R. Varalakshmi | Dr. V. Rhymend Uthariaraj
Shared Cryptography with Embedded Session Key for Secret Audio

Author(s): Prabir Kr. Naskar | Hari Narayan Khan | Ujjal Roy | Ayan Chaudhuri | Atal Chaudhuri
Sec.AODV for MANETs using MD5 with Cryptography

Author(s): Suketu D. Nayak | Ravindra K. Gupta
Secure Routing Scheme in MANETs using Secret Key Sharing

Author(s): A. Amuthan | B.Aravind Baradwaj
Affiliate Program     

Tango Jona
Tangokurs Rapperswil-Jona