Suggested Topics within your search.
Suggested Topics within your search.
secret sharing
6
Matrix algebra
4
Base matrix
3
Codes (symbols)
3
Coefficient matrix
3
Convolution
3
Convolutional neural network
3
Convolutional neural networks
3
Error correction
3
Information exchanges
3
Internet of things
3
Iterative methods
3
Matrix factorization
3
Network coding
3
Nonnegative Matrix Factorization
3
Nonnegative matrix factorization
3
Open source software
3
Open systems
3
Optical resolving power
3
Quick response code
3
Regularisation
3
Secret-sharing
3
Structural regularization
3
Superresolution
3
basis matrix
3
coefficient matrix
3
convolutional neural network
3
quick response code
3
structural regularization
3
super resolution
3
-
1
-
2“...<p>Abstract</p> <p>Traditional Secret Sharing (SS) schemes reconstruct secret exactly the same...”
Get full text
Article -
3
-
4by Reyzin, Alissa Natanovna“... for a variety of player types. A keystone functionality used in cryptography is Secret Sharing. While...”
Published 2009
Get full text
Others -
5
-
6by Johansson, Håkan“...In this thesis, four different methods for secret sharing with threshold schemes...”
Published 2020
Get full text
Others -
7“...碩士 === 銘傳大學 === 資訊工程學系碩士班 === 106 === The aim of a (k, n) threshold secret sharing scheme...”
Get full text
Others -
8
-
9“...The paper addresses the cheating prevention in secret sharing. We consider secret sharing...”
Get full text
Article -
10by Farràs Ventura, Oriol“...This thesis is dedicated to the study of secret sharing schemes, which are cryptographic methods...”
Published 2010
Get full text
Doctoral Thesis -
11
-
12
-
13“...碩士 === 臺北市立教育大學 === 資訊科學系碩士班 === 99 === Secret sharing is an elegant approach for safeguarding...”
Get full text
Others -
14“...。One of them is Quantum Key Distribution (QKD),the other is Quantum Secret Sharing (QSS)。QKD...”
Get full text
Others -
15
-
16
-
17by Schultz, David Andrew“... references (p. 153-157). === This thesis describes mobile proactive secret sharing (MPSS), an extension...”
Published 2008
Get full text
Others -
18
-
19
-
20“.... Therefore, a secret sharing system based upon QR code is proposed in this article. The method generates n...”
Get full text
Others