Pages that link to "Item:Q3992205"
From MaRDI portal
The following pages link to The Detection of Cheaters in Thershold Schemes (Q3992205):
Displaying 18 items.
- Robust vector space secret sharing schemes (Q293422) (← links)
- Comments on Harn-Lin's cheating detection scheme (Q540475) (← links)
- On the information rate of secret sharing schemes (Q672750) (← links)
- Detection and identification of cheaters in \((t,n)\) secret sharing scheme (Q1009167) (← links)
- An explication of secret sharing schemes (Q1203951) (← links)
- How to avoid the cheaters succeeding in the key sharing scheme (Q1261009) (← links)
- A perfect threshold secret sharing scheme to identify cheaters (Q1804974) (← links)
- Graph decompositions and secret sharing schemes (Q1842517) (← links)
- Further results on asymmetric authentication schemes (Q1854283) (← links)
- Some democratic secret sharing schemes (Q1893162) (← links)
- How and how much to invest for fighting cheaters: from an ODE to a cellular automata model (Q1992176) (← links)
- Dynamic threshold based information leaker identification scheme (Q2414054) (← links)
- Cheating detectable threshold scheme against most powerful cheaters for long secrets (Q2448093) (← links)
- Cheating in visual cryptography (Q2491269) (← links)
- Efficient cheater identification method for threshold schemes (Q3125909) (← links)
- Cheating-Tolerant and Threshold-Based Secure Information Exchange Among Propinquity of Adversaries (Q5050226) (← links)
- How to fairly reconstruct a shared secret (Q5235415) (← links)
- Information Security and Cryptology - ICISC 2003 (Q5714142) (← links)