A Novel Verifiable Multisecret Sharing Scheme in Wireless Multimedia Sensor Networks
暂无分享,去创建一个
[1] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[2] Baruch Awerbuch,et al. Verifiable secret sharing and achieving simultaneity in the presence of faults , 1985, 26th Annual Symposium on Foundations of Computer Science (sfcs 1985).
[3] Hung-Yu Chien,et al. A Practical ( t , n ) Multi-Secret Sharing Scheme , 2000 .
[4] Lei Tian,et al. Chaotic secure content-based hidden transmission of biometric templates , 2007 .
[5] Massoud Hadian Dehkordi,et al. An efficient threshold verifiable multi-secret sharing , 2008, Comput. Stand. Interfaces.
[6] Muhammad Khurram Khan,et al. Cryptanalysis and Security Improvements of ‘Two-Factor User Authentication in Wireless Sensor Networks’ , 2010, Sensors.
[7] Hermann de Meer,et al. Dynamic key management in wireless sensor networks: A survey , 2013, J. Netw. Comput. Appl..
[8] Sun Qian,et al. A Novel Key Pre-distribution for Wireless Sensor Networks , 2012 .
[9] Martin Tompa,et al. How to share a secret with cheaters , 1988, Journal of Cryptology.
[10] Manik Lal Das,et al. Two-factor user authentication in wireless sensor networks , 2009, IEEE Transactions on Wireless Communications.
[11] J. He,et al. Multisecret-sharing scheme based on one-way function , 1995 .
[12] Rong Zhao,et al. A practical verifiable multi-secret sharing scheme , 2007, Comput. Stand. Interfaces.
[13] David Zhang,et al. A cryptosystem based on palmprint feature , 2008, 2008 19th International Conference on Pattern Recognition.
[14] Liangliang Xiao,et al. Linear multi-secret sharing schemes based on multi-party computation , 2006, Finite Fields Their Appl..
[15] Min-Shiang Hwang,et al. A (t, n) multi-secret sharing scheme , 2004, Appl. Math. Comput..
[16] Yen-Ping Chu,et al. A multiple-level visual secret-sharing scheme without image size expansion , 2007, Inf. Sci..
[17] Zhenfu Cao,et al. A new efficient (t, n) verifiable multi-secret sharing (VMSS) based on YCH scheme , 2005, Appl. Math. Comput..
[18] Chin-Chen Chang,et al. A scheme for threshold multi-secret sharing , 2005, Appl. Math. Comput..
[19] Muhammad Khurram Khan,et al. Secure Chaotic Map Based Block Cryptosystem with Application to Camera Sensor Networks , 2011, Sensors.
[20] Ning Zhang,et al. Resource-efficient authentic key establishment in heterogeneous wireless sensor networks , 2013, J. Parallel Distributed Comput..
[21] Adi Shamir,et al. How to share a secret , 1979, CACM.