From post

Hierarchical Secret Sharing Schemes Secure Against Rushing Adversary: Cheater Identification and Robustness.

, , , , , , и . ISPEC, том 11125 из Lecture Notes in Computer Science, стр. 578-594. Springer, (2018)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

Cross-group Secret Sharing for Secure Cloud Storage Service., , , , и . IMCOM, стр. 63:1-63:8. ACM, (2016)Investing Data with Untrusted Parties using HE., , , и . SECRYPT, стр. 845-853. SCITEPRESS, (2021)CMCAP: Ephemeral Sandboxes for Adaptive Access Control., , и . SACMAT, стр. 207-212. ACM, (2019)Efficient Protocols Achieving the Commitment Capacity of Noisy Correlations., , , и . ISIT, стр. 1432-1436. IEEE, (2006)Verifying OAuth Implementations Through Encrypted Network Analysis., , и . SACMAT, стр. 227-229. ACM, (2019)Cross-group secret sharing scheme for secure usage of cloud storage over different providers and regions., , , , и . J. Supercomput., 73 (10): 4275-4301 (2017)An Efficient Robust Secret Sharing Scheme with Optimal Cheater Resiliency., , , , и . SPACE, том 8804 из Lecture Notes in Computer Science, стр. 47-58. Springer, (2014)Semantic security for the McEliece cryptosystem without random oracles., , , и . Des. Codes Cryptogr., 49 (1-3): 289-305 (2008)Generalized Oblivious Transfer Protocols Based on Noisy Channels., и . MMM-ACNS, том 2052 из Lecture Notes in Computer Science, стр. 219-229. Springer, (2001)Parity Check based redistribution of secret shares., и . ISIT, стр. 959-963. IEEE, (2015)