设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
Wiley电子期刊(2)
SpringerLink电子期刊(235)
NATURE电子期刊(1)
Springer电子图书(4)
ProQuest学位论文(6)
Elsevier电子期刊(133)
在“
Elsevier电子期刊
”中,
命中:
133
条,耗时:0.0219577 秒
在所有数据库中总计命中:
381
条
1.
Threshold
multi-
secret
sharing
scheme based on phase-shifting interferometry
作者:
Xiaopeng Deng
;
dxpzqh@163.com
;
Wei Wen
;
Zhengang Shi
关键词:
Threshold
multi-
secret
sharing
;
Phase-shifting interferometry
;
Shadow image
;
Encoded image
刊名:Optics Communications
出版年:2017
2.
Color transfer visual cryptography with perfect security
作者:
Ching-Nung Yang
a
;
cnyang@mail.ndhu.edu.tw
;
Tzu-Chia Tung
a
;
Fu-Heng Wu
a
;
Zhili Zhou
b
关键词:
Visual cryptography
;
Secret
sharing
;
Threshold
scheme
;
Digital halftoning
;
Halftoned image
;
Color transfer
刊名:Measurement
出版年:2017
3.
DKEM: Secure and efficient Distributed Key Establishment Protocol for Wireless Mesh Networks
作者:
Duygu Karaoğlan Altop
duyguk@sabanciuniv.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Muhammed Ali Bingö
;
l
;
mabingol@sabanciuniv.edu" class="auth_mail" title="E-mail the corresponding author
;
muhammedali.bingol@tubitak.gov.tr" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Albert Levi
levi@sabanciuniv.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Erkay Savaş
erkays@sabanciuniv.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
关键词:
Wireless Mesh Networks
;
Key establishment
;
Identity-based cryptography
;
Threshold
secret
sharing
刊名:Ad Hoc Networks
出版年:2017
4.
New privilege-based visual cryptography with arbitrary privilege levels
作者:
Ching-Nung Yang
a
;
Jung-Kuo Liao
a
;
Dao-Shun Wang
b
;
c
;
daoshun@mail.tsinghua.edu.cn
关键词:
Visual cryptography
;
Visual
secret
sharing
;
Threshold
scheme
;
Privilege level
;
Contrast
刊名:Journal of Visual Communication and Image Representation
出版年:2017
5.
A reversible data hiding method for H.264 with Shamir’s (t, n)-
threshold
secret
sharing
作者:
Yunxia Liu
a
;
liuyunxia0110@mail.hust.edu.cn" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Liang Chen
c
Author Vitae
;
Mingsheng Hu
a
Author Vitae
;
Zhijuan Jia
a
Author Vitae
;
Suimin Jia
a
Author Vitae
;
Hongguo Zhao
b
Author Vitae
关键词:
Reversible data hiding
;
H.264/advanced video coding (AVC)
;
Shamir&rsquo
;
s (tn)-
threshold
secret
sharing
;
Intra-frame distortion drift
刊名:Neurocomputing
出版年:2016
6.
Verifiable (t,n)
threshold
quantum
secret
sharing
using d-dimensional Bell state
作者:
Huawang Qin
;
qin_h_w@163.com" class="auth_mail" title="E-mail the corresponding author
;
Yuewei Dai
关键词:
Quantum
secret
sharing
;
Verifiable quantum
secret
sharing
;
Bell state
;
Quantum cryptography
;
Cryptography
刊名:Information Processing Letters
出版年:2016
7.
Realizing
secret
sharing
with general access structure
作者:
Lein Harn
a
;
b
;
1
;
harnl@umkc.edu" class="auth_mail" title="E-mail the corresponding author
;
Chingfang Hsu
c
;
1
;
cherryjingfang@gmail.com" class="auth_mail" title="E-mail the corresponding author
;
Mingwu Zhang
a
;
csmwzhang@gmail.com" class="auth_mail" title="E-mail the corresponding author
;
Tingting He
c
;
tthe@mail.ccnu.edu.cn" class="auth_mail" title="E-mail the corresponding author
;
Maoyuan Zhang
c
;
zhangmyccnu@126.com" class="auth_mail" title="E-mail the corresponding author
关键词:
General
secret
sharing
;
Chinese remainder theorem
;
Secret
sharing
policy
;
Monotone function
;
Integer optimization
;
Minimal positive access subset
;
Maximal negative access subset
刊名:Information Sciences
出版年:2016
8.
Distributive weighted
threshold
secret
sharing
schemes
作者:
Constantin Cătălin Drăgan
constantin.dragan@info.uaic.ro" class="auth_mail" title="E-mail the corresponding author
;
Ferucio Laurenţiu Ţiplea
;
fltiplea@info.uaic.ro" class="auth_mail" title="E-mail the corresponding author
;
fltiplea@gmail.com" class="auth_mail" title="E-mail the corresponding author
关键词:
Access structure
;
Secret
sharing
scheme
;
Chinese remainder theorem
;
Entropy
刊名:Information Sciences
出版年:2016
9.
Essential
secret
image
sharing
scheme with the same size of shadows
作者:
Peng Li
a
;
lphit@163.com" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Ching-Nung Yang
b
Author Vitae
;
Zhili Zhou
c
Author Vitae
关键词:
Secret
image
sharing
;
Threshold
secret
sharing
;
Essential shadow
;
Derivative polynomial
;
Birkhoff interpolation
刊名:Digital Signal Processing
出版年:2016
10.
A New
Secret
Sharing
Scheme
作者:
Ibrahim Ozbek
iozbek@yildiz.edu.tr
关键词:
Secret
sharing
schemes
;
error correcting codes
;
syndrome decoding problem
刊名:Electronic Notes in Discrete Mathematics
出版年:2016
1
2
3
4
5
6
7
8
9
按检索点细分(133)
题名(23)
关键词(56)
文摘(90)
按出版年细分(133)
2027年及以后(7)
2017年(4)
2016年(11)
2015年(2)
2013年(8)
2012年(12)
2011年(9)
2010年(12)
2009年(3)
2008年(5)
2007年(11)
2006年(6)
2005年(9)
2004年(10)
2003年(3)
2002年(1)
2000年(3)
2000年及以前(17)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.