-
21
Analysis and design of visual secret sharing scheme for gray image
Published 2020-08-01Subjects: “…visual secret sharing…”
Get full text
Article -
22
ECMO: An Efficient and Confidential Outsourcing Protocol for Medical Data
Published 2025-01-01Subjects: “…Additive secret sharing…”
Get full text
Article -
23
Quantum secret sharing with graph states based on Chinese remainder theorem
Published 2018-10-01Subjects: Get full text
Article -
24
Study of secret sharing schemes based on quantum theory
Published 2009-01-01Subjects: “…quantum secret sharing(QSS)…”
Get full text
Article -
25
Efficiency identity-based threshold group signature scheme
Published 2009-01-01Subjects: Get full text
Article -
26
Design models of secret reconstruction towards rational users
Published 2021-11-01Subjects: “…secret sharing…”
Get full text
Article -
27
Design of shuffling protocol based on additive secret sharing
Published 2024-08-01Subjects: “…additive secret sharing…”
Get full text
Article -
28
New secure distributed secret sharing scheme of n product
Published 2014-11-01Subjects: Get full text
Article -
29
Single password authentication method for remote user based on mobile terminal assistance
Published 2019-02-01Subjects: Get full text
Article -
30
Secure User Authentication With Information Theoretic Security Using Secret Sharing-Based Secure Computation
Published 2025-01-01Subjects: Get full text
Article -
31
Classification auditting scheme for privacy protection of outsourced EHR based on distributed storage
Published 2024-09-01Subjects: Get full text
Article -
32
Block level cloud data deduplication scheme based on attribute encryption
Published 2023-10-01Subjects: Get full text
Article -
33
Rational secret sharing scheme based on Markov decision
Published 2015-09-01Subjects: “…rational secret sharing…”
Get full text
Article -
34
Flexible Threshold Quantum Homomorphic Encryption on Quantum Networks
Published 2024-12-01Subjects: Get full text
Article -
35
Multi-owner accredited keyword search over encrypted data
Published 2017-11-01Subjects: Get full text
Article -
36
A Novel Secret Sharing Method Based on Binary Sequence
Published 2015-11-01Subjects: “…secret sharing…”
Get full text
Article -
37
Towards edge-collaborative,lightweight and secure region proposal network
Published 2020-10-01Subjects: Get full text
Article -
38
RLWE-based ciphertext-policy attribute proxy re-encryption
Published 2018-11-01Subjects: Get full text
Article -
39
-
40
Design method of secure computing protocol for deep neural network
Published 2020-08-01Subjects: Get full text
Article