Secure Information Management Using Linguistic Threshold Approach
暂无分享,去创建一个
[1] Taher ElGamal,et al. A public key cyryptosystem and signature scheme based on discrete logarithms , 1985 .
[2] Jennifer Seberry,et al. Cryptography - an introduction to computer security , 1991, Advances in computer science series.
[3] Lidia Ogiela,et al. UBIAS systems for cognitive interpretation and analysis of medical images , 2009 .
[4] Marek R. Ogiela,et al. Grammar Encoding in DNA-Like Secret Sharing Infrastructure , 2010, AST/UCMA/ISA/ACN.
[5] K. Rajasekhara Rao,et al. Privacy Preserving Data Mining , 2013 .
[6] Helmut Krcmar,et al. Information management , 1994 .
[7] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[8] Donald J. McCubbrey,et al. Management Information Systems for the Information Age , 1997 .
[9] I. Monitor. Information Security Management Handbook , 2000 .
[10] Adi Shamir,et al. How to share a secret , 1979, CACM.
[11] Marek R. Ogiela,et al. Linguistic Approach to Cryptographic Data Sharing , 2008, 2008 Second International Conference on Future Generation Communication and Networking.
[12] Tzong-Chen Wu,et al. A geometric approach for sharing secrets , 1995, Comput. Secur..
[13] Gustavus J. Simmons,et al. Subliminal channels; past and present , 2010, Eur. Trans. Telecommun..
[14] Marek R. Ogiela,et al. The use of mathematical linguistic methods in creating secret sharing threshold algorithms , 2010, Comput. Math. Appl..
[15] Adi Shamir,et al. Efficient Signature Schemes Based on Polynomial Equations , 1984, CRYPTO.
[16] Bernard P. Zajac. Applied cryptography: Protocols, algorithms, and source code in C , 1994 .
[17] Neri dos Santos,et al. Information Science and the Strategic Knowledge Management: Complementarily and Dependence , 2000 .
[18] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[19] Marek R. Ogiela,et al. DNA-like linguistic secret sharing for strategic information systems , 2012, Int. J. Inf. Manag..
[20] Marten van Dijk. On the information rate of perfect secret sharing schemes , 1995, Des. Codes Cryptogr..
[21] John Ladley,et al. Making Enterprise Information Management (EIM) Work for Business: A Guide to Understanding Information as an Asset , 2010 .
[22] Najah Naffah,et al. Information technology for managers , 1984 .
[23] Krzysztof Walczak,et al. Visualizing Web search results in 3D , 2004, Computer.
[24] Martin Tompa,et al. How to share a secret with cheaters , 1988, Journal of Cryptology.
[25] Tatsuaki Okamoto. A fast signature scheme based on congruential polynomial operations , 1990, IEEE Trans. Inf. Theory.
[26] Wojciech Cellary. Globalization from the Information and Communication Perspective , 2007, ICDCIT.
[27] G. Reynolds. Information Technology for Managers , 2009 .
[28] Marek R. Ogiela,et al. Cognitive Techniques in Visual Data Interpretation , 2009, Studies in Computational Intelligence.
[29] Marek R. Ogiela,et al. Linguistic protocols for secure information management and sharing , 2012, Comput. Math. Appl..
[30] Martin Harris,et al. Strategic planning for information systems , 1991, J. Inf. Technol..