Author of the publication

Randomized Component and Its Application to (t, m, n)-Group Oriented Secret Sharing.

, , , and . IEEE Trans. Inf. Forensics Secur., 10 (5): 889-899 (2015)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Multilevel threshold secret sharing based on the Chinese Remainder Theorem., and . Inf. Process. Lett., 114 (9): 504-509 (2014)An Automated Analyzer for Financial Security of Ethereum Smart Contracts., , , , , , , and . CoRR, (2022)Randomized Component and Its Application to (t, m, n)-Group Oriented Secret Sharing., , , and . IEEE Trans. Inf. Forensics Secur., 10 (5): 889-899 (2015)A Novel Data Aggregation Scheme for Wireless Sensor Networks Based on Robust Chinese Remainder Theorem., and . MSN, page 121-125. IEEE, (2022)The Centralized Group Key Management Scheme Based-Chinese Remainder Theorem in Multicast Communication., and . BigCom, page 128-133. IEEE, (2022)An Improved Data Aggregation Scheme for Wireless Sensor Networks Based on Robust Chinese Remainder Theorem., and . APNet, page 170-171. ACM, (2023)Divide and conquer: recovering contextual information of behaviors in Android apps around limited-quantity audit logs., , , , , and . ICSE (Companion Volume), page 230-231. IEEE / ACM, (2019)Physically Secure Lightweight and Privacy-Preserving Message Authentication Protocol for VANET in Smart City., , , and . IEEE Trans. Veh. Technol., 70 (12): 12902-12917 (2021)Verifiable secret sharing based on the Chinese remainder theorem., , and . Secur. Commun. Networks, 7 (6): 950-957 (2014)A Secure Distributed Authentication scheme based on CRT-VSS and Trusted Computing in MANET., , , , , and . CoRR, (2013)