From post

An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem.

, , и . ACISP, том 6812 из Lecture Notes in Computer Science, стр. 259-275. Springer, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels., , и . ProvSec, том 4784 из Lecture Notes in Computer Science, стр. 17-34. Springer, (2007)Graph Design for Secure Multiparty Computation over Non-Abelian Groups., , и . ASIACRYPT, том 5350 из Lecture Notes in Computer Science, стр. 37-53. Springer, (2008)Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures., , и . Inscrypt, том 4990 из Lecture Notes in Computer Science, стр. 167-181. Springer, (2007)Rateless Codes for the Multicast Stream Authentication Problem., и . IWSEC, том 4266 из Lecture Notes in Computer Science, стр. 136-151. Springer, (2006)Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes., и . CANS, том 5339 из Lecture Notes in Computer Science, стр. 196-213. Springer, (2008)Efficient multicast stream authentication for the fully adversarial network model., и . Int. J. Secur. Networks, 2 (3/4): 175-191 (2007)An Efficient Rational Secret Sharing Scheme Based on the Chinese Remainder Theorem., , и . ACISP, том 6812 из Lecture Notes in Computer Science, стр. 259-275. Springer, (2011)Combining Prediction Hashing and MDS Codes for Efficient Multicast Stream Authentication., и . ACISP, том 4586 из Lecture Notes in Computer Science, стр. 293-307. Springer, (2007)Ensuring Authentication of Digital Information Using Cryptographic Accumulators.. CANS, том 5888 из Lecture Notes in Computer Science, стр. 315-333. Springer, (2009)Privacy-Preserving Distributed Set Intersection., , и . ARES, стр. 1332-1339. IEEE Computer Society, (2008)