Author of the publication

Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes.

, and . CANS, volume 5339 of Lecture Notes in Computer Science, page 196-213. Springer, (2008)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Graph Design for Secure Multiparty Computation over Non-Abelian Groups., , and . ASIACRYPT, volume 5350 of Lecture Notes in Computer Science, page 37-53. Springer, (2008)An Hybrid Approach for Efficient Multicast Stream Authentication over Unsecured Channels., , and . ProvSec, volume 4784 of Lecture Notes in Computer Science, page 17-34. Springer, (2007)A Practical Framework for $t$-Out-of- $n$ Oblivious Transfer With Security Against Covert Adversaries., , , , and . IEEE Trans. Inf. Forensics Secur., 7 (2): 465-479 (2012)Privacy-Preserving Distributed Set Intersection., , and . IACR Cryptology ePrint Archive, (2007)Analysis and Design of Multiple Threshold Changeable Secret Sharing Schemes., and . CANS, volume 5339 of Lecture Notes in Computer Science, page 196-213. Springer, (2008)Rateless Codes for the Multicast Stream Authentication Problem., and . IWSEC, volume 4266 of Lecture Notes in Computer Science, page 136-151. Springer, (2006)Verifiable Multi-secret Sharing Schemes for Multiple Threshold Access Structures., , and . Inscrypt, volume 4990 of Lecture Notes in Computer Science, page 167-181. Springer, (2007)Attack Simulation based Software Protection Assessment Method with Petri Net., , , , , , and . Int. J. Cyber Situational Aware., 1 (1): 152-181 (2016)Efficient multicast stream authentication for the fully adversarial network model., and . Int. J. Secur. Networks, 2 (3/4): 175-191 (2007)Ensuring Authentication of Digital Information Using Cryptographic Accumulators.. CANS, volume 5888 of Lecture Notes in Computer Science, page 315-333. Springer, (2009)