From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Efficient Threshold Secret Sharing Schemes Secure Against Rushing Cheaters., , , , , и . ICITS, том 10015 из Lecture Notes in Computer Science, стр. 3-23. (2016)An efficient multi-use multi-secret sharing scheme based on hash function, и . CoRR, (2011)Efficient Construction of Visual Cryptographic Scheme for Compartmented Access Structures., , и . IACR Cryptology ePrint Archive, (2016)A New (2, n)-Visual Threshold Scheme for Color Images., и . INDOCRYPT, том 2904 из Lecture Notes in Computer Science, стр. 148-161. Springer, (2003)Signcryption from Randomness Recoverable PKE Revisited., и . ICISS, том 8303 из Lecture Notes in Computer Science, стр. 78-90. Springer, (2013)Mixed-Strategy Game Based Trust Management for Clustered Wireless Sensor Networks., , и . INTRUST, том 7222 из Lecture Notes in Computer Science, стр. 239-257. Springer, (2011)A New Scrambling Evaluation Scheme Based on Spatial Distribution Entropy and Centroid Difference of Bit-Plane., , и . IWDW, том 6526 из Lecture Notes in Computer Science, стр. 29-44. Springer, (2010)Full key recovery of ACORN with a single fault., , и . J. Inf. Secur. Appl., (2016)Computationally Secure Cheating Identifiable Multi-Secret Sharing for General Access Structure., , и . ICDCIT, том 8956 из Lecture Notes in Computer Science, стр. 278-287. Springer, (2015)DNA Secret Sharing.. IEEE Congress on Evolutionary Computation, стр. 1407-1411. IEEE, (2006)