Author of the publication

Sequential Secret Sharing Scheme Based on Level Ordered Access Structure.

, , , and . Int. J. Netw. Secur., 18 (5): 874-881 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

A shrinking polytope method for linear programming., , and . Neural Parallel & Scientific Comp., 4 (3): 325-340 (1996)Lightweight Cryptography for Distributed PKI Based MANETS., , , and . CoRR, (2018)Equivalence of lower bounds on the number of perfect pairs., , , and . CoRR, (2014)Ideal and Perfect Hierarchical Secret Sharing Schemes based on MDS codes., , and . IACR Cryptology ePrint Archive, (2013)Fuzzy adaptive bacterial foraging congestion management using sensitivity based optimal active power re-scheduling of generators., and . Appl. Soft Comput., 11 (8): 4921-4930 (2011)Towards a Hybrid Public Key Infrastructure (PKI): A Review., , , and . IACR Cryptology ePrint Archive, (2019)Privacy-preserving frequent itemset mining in vertically partitioned database using symmetric homomorphic encryption scheme., and . Int. J. Inf. Priv. Secur. Integr., 4 (3): 203-225 (2020)Acyclic vertex coloring of graphs of maximum degree 5., , , and . Discret. Math., 311 (5): 342-348 (2011)Ideal and Computationally Perfect Secret Sharing Schemes for Generalized Access Structures., , and . SSCC, volume 467 of Communications in Computer and Information Science, page 149-161. Springer, (2014)A concise algorithm to solve over-/under-determined linear systems., , and . Simulation, 54 (5): 239-240 (1990)