Author of the publication

(t, n) multi-secret sharing scheme extended from Harn-Hsu's scheme.

, , and . EURASIP J. Wireless Comm. and Networking, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A hybrid approach combining data hiding with visual cryptography for secure extraction of data hiding., , , and . J. Inf. Secur. Appl., (June 2023)Enhance Embedding Capacity of Generalized Exploiting Modification Directions in Data Hiding., , and . IEEE Access, (2018)Wireless Network Scheduling With Discrete Propagation Delays: Theorems and Algorithms., , and . IEEE Trans. Inf. Theory, 70 (3): 1852-1875 (2024)ABCAttack: A Gradient-Free Optimization Black-Box Attack for Fooling Deep Image Classifiers., , , , , and . Entropy, 24 (3): 412 (2022)A novel energy-aware trustworthy multi-hop routing model for Internet of things., , , , , and . Int. J. Distributed Sens. Networks, (2018)Reliable Throughput of Generalized Collision Channel without Synchronization., , , , and . ISIT, page 2697-2702. IEEE, (2023)Efficient group authentication in RFID using secret sharing scheme., , , , and . Clust. Comput., 22 (Supplement): 8605-8611 (2019)One-Shot Coding over General Noisy Networks., and . CoRR, (2024)Linear (k, n) secret sharing scheme with cheating detection.. Secur. Commun. Networks, 9 (13): 2115-2121 (2016)Progressive (k, n) secret image sharing Scheme with meaningful shadow images by GEMD and RGEMD., , , , and . J. Vis. Commun. Image Represent., (2018)