Constructing secret sharing schemes based on cyclic
Saved in:
Main Author: | Hoo, Mei Hui |
---|---|
Format: | Final Year Project / Dissertation / Thesis |
Published: |
2014
|
Subjects: | |
Online Access: | http://eprints.utar.edu.my/1352/1/AM%2D2014%2D1100118%2D1.pdf http://eprints.utar.edu.my/1352/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Secret sharing scheme for collaborative access system
by: Kadir, Rashidah, et al.
Published: (2000) -
Secret sharing scheme security and performance analysis
by: Abdallah, A., et al.
Published: (2016) -
Analysis and comparison the security and performance of secret sharing schemes
by: Abdallah, Aisha, et al.
Published: (2015) -
A secure data outsourcing scheme based on Asmuth–Bloom secret sharing
by: Muhammad, Yusuf Idris, et al.
Published: (2016) -
Medical image dispersal using enhanced secret sharing threshold scheme
by: Nelmiawati, Nelmiawati, et al.
Published: (2015)