8   Artículos

« Anterior     Página: 1 de 1     Siguiente »

 
en línea
Yu-Hong Chen and Justie Su-Tzu Juan    
XOR-based Visual Cryptography Scheme (XOR-based VCS) is a method of secret image sharing. The principle of XOR-based VCS is to encrypt a secret image into several encrypted images, called shares. No information about the secret can be obtained from any o... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Anjaneyulu Endurthi,Oinam B. Chanu,Appala N. Tentu,V. Ch. Venkaiah     Pág. 15 - 24
Three secret sharing schemes that use the Mignotte?ssequence and two secret sharing schemes that use the Asmuth-Bloom sequence are proposed in this paper. All these five secret sharing schemes are based on Chinese Remainder Theorem (CRT) [8]. The first s... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

 
en línea
Djihed Anani,Kamel M. Faraoun     Pág. 94 - 103
In this paper, we present a new (t,n)-threshold secret images sharing scheme based on linear memory cellular automata (LMCA). While all existing LMCA-based sharing scheme are not robust, the proposed one provides full robustness property. Precisely, any ... ver más
Revista: Journal of Communications Software and Systems    Formato: Electrónico

 
en línea
Tao Feng, Dewei Wang and Renbin Gong    
When choosing a third-party cloud storage platform, the confidentiality of data should be the primary concern. To address the issue of one-to-many access control during data sharing, it is important to encrypt data with an access policy that enables fine... ver más
Revista: Information    Formato: Electrónico

 
en línea
Tao Liu, Bin Yan and Jeng-Shyang Pan    
Visual secret sharing is a secret sharing scheme where the decryption requires no computation. It has found many applications in online transaction security, privacy protection, and bar code security, etc. Recently, researches have indicated that combini... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Ou Ruan, Changwang Yan, Jing Zhou and Chaohao Ai    
Multiparty Private Set Intersection (MPSI) is dedicated to finding the intersection of datasets of multiple participants without disclosing any other information. Although many MPSI protocols have been presented, there are still some important practical ... ver más
Revista: Applied Sciences    Formato: Electrónico

 
en línea
Bimal Kumar Roy and Anandarup Roy    
Secret sharing schemes are widely used to protect data by breaking the secret into pieces and sharing them amongst various members of a party. In this paper, our objective is to produce a repairable ramp scheme that allows for the retrieval of a share th... ver más
Revista: IoT    Formato: Electrónico

 
en línea
Agus Winarno and Riri Fitri Sari    
Personal data security is a cybersecurity trend that has captured the world?s attention. Governments, practitioners and academics are jointly building personal data security in various communication systems, including IoT. The protocol that is widely use... ver más
Revista: Applied Sciences    Formato: Electrónico

« Anterior     Página: 1 de 1     Siguiente »