Neural network based group authentication using (n, n) secret sharing scheme
暂无分享,去创建一个
[1] Hui Li,et al. A Lossless Tagged Visual Cryptography Scheme , 2014, IEEE Signal Processing Letters.
[2] Duncan S. Wong,et al. On Secret Reconstruction in Secret Sharing Schemes , 2008, IEEE Transactions on Information Theory.
[3] Achour Mostéfaoui,et al. Low-Cost Secret-Sharing in Sensor Networks , 2010, 2010 IEEE 12th International Symposium on High Assurance Systems Engineering.
[4] Mitsugu Iwamoto. A Weak Security Notion for Visual Secret Sharing Schemes , 2012, IEEE Transactions on Information Forensics and Security.
[5] Bhavani M. Thuraisingham,et al. Secure Data Objects Replication in Data Grid , 2010, IEEE Transactions on Dependable and Secure Computing.
[6] Lein Harn,et al. Group Authentication , 2013, IEEE Transactions on Computers.
[7] Xiaojiang Du,et al. Two matrices for Blakley's secret sharing scheme , 2012, 2012 IEEE International Conference on Communications (ICC).
[8] Wei-Ho Chung,et al. A Probabilistic Model of $(t,n)$ Visual Cryptography Scheme With Dynamic Group , 2012, IEEE Transactions on Information Forensics and Security.
[9] Siddharth Bali,et al. Public key cryptography using neural networks and genetic algorithms , 2013, 2013 Sixth International Conference on Contemporary Computing (IC3).
[10] Wael Alghamdi. Secure data collection in wireless sensor networks , 2017 .
[11] Chin-Chen Chang,et al. A novel efficient (t, n) threshold proxy signature scheme , 2006, Inf. Sci..
[12] Kamer Kaya,et al. Threshold Cryptography Based on Blakley Secret Sharing , 2008 .
[13] Adel A. El-Zoghabi,et al. Survey Report on Cryptography Based on Neural Network , 2013 .
[14] T. Godhavari,et al. Cryptography Using Neural Network , 2005, 2005 Annual IEEE India Conference - Indicon.
[15] B TRajendraA,et al. A New Approach to Analyze Visual Secret Sharing Schemes For Biometric Authentication-A Survey , 2013, FOCS 2013.
[16] Tai-Wen Yue,et al. A Neural-Network Approach for Visual Cryptography and Authorization , 2004, HIS.
[17] Huy Hoang Ngo,et al. Dynamic Key Cryptography and Applications , 2010, Int. J. Netw. Secur..
[18] Donghui Guo,et al. Security Analysis of Public-key Encryption Scheme Based on Neural Networks and Its Implementing , 2006, 2006 International Conference on Computational Intelligence and Security.
[19] Tai-Wen Yue,et al. A neural network approach for visual cryptography , 2000, Proceedings of the IEEE-INNS-ENNS International Joint Conference on Neural Networks. IJCNN 2000. Neural Computing: New Challenges and Perspectives for the New Millennium.