设为首页
收藏本站
网站地图
|
English
|
公务邮箱
About the library
Background
History
Leadership
Organization
Readers' Guide
Opening Hours
Collections
Help Via Email
Publications
Electronic Information Resources
常用资源
电子图书
期刊论文
学位会议
外文资源
特色专题
内部出版物
Springer电子图书(58)
CNKI会议论文(2)
CNKI学位论文(2809)
CNKI期刊论文0611(1)
知网期刊论文(1940)
在“
Elsevier电子期刊
”中,
命中:
523
条,耗时:0.0139942 秒
在所有数据库中总计命中:
4,810
条
1.
Threshold multi-
secret
sharing
scheme based on phase-shifting interferometry
作者:
Xiaopeng Deng
;
dxpzqh@163.com
;
Wei Wen
;
Zhengang Shi
关键词:
Threshold multi-
secret
sharing
;
Phase-shifting interferometry
;
Shadow image
;
Encoded image
刊名:Optics Communications
出版年:2017
2.
Secure publicly verifiable and proactive
secret
sharing
schemes with general access structure
作者:
Samaneh Mashhadi
smashhadi@iust.ac.ir" class="auth_mail" title="E-mail the corresponding author
关键词:
Publicly verifiable
secret
sharing
;
Proactive scheme
;
Standard model
;
Bilinear pairing
;
Monotone span program
;
Robust
刊名:Information Sciences
出版年:2017
3.
A new
sharing
digital image scheme with clearer shadow images
作者:
Ching-Nung Yang
a
;
cnyang@gms.ndhu.edu.tw
;
Chihi-Han Wu
a
;
Zong-Xuan Yeh
a
;
Dao-Shun Wang
b
;
daoshun@mail.tsinghua.edu.cn
;
Cheonshik Kim
c
关键词:
Secret
sharing
;
Digital image
;
Color palette
;
Boolean exclusive-or operation
刊名:Computer Standards & Interfaces
出版年:2017
4.
Optimal binary codes from trace codes over a non-chain ring
作者:
Minjia Shi
a
;
b
;
c
;
smjwcl.good@163.com
;
Yan Liu
c
;
liuyan2612@126.com
;
Patrick Solé
;
d
;
sole@enst.fr
关键词:
Two-weight codes
;
Griesmer bound
;
Trace codes
;
Secret
sharing
schemes
刊名:Discrete Applied Mathematics
出版年:2017
5.
Color transfer visual cryptography with perfect security
作者:
Ching-Nung Yang
a
;
cnyang@mail.ndhu.edu.tw
;
Tzu-Chia Tung
a
;
Fu-Heng Wu
a
;
Zhili Zhou
b
关键词:
Visual cryptography
;
Secret
sharing
;
Threshold scheme
;
Digital halftoning
;
Halftoned image
;
Color transfer
刊名:Measurement
出版年:2017
6.
Attacks to some verifiable multi-
secret
sharing
schemes and two improved schemes
作者:
Yanhong Liu
a
;
c
;
angelpray@126.com" class="auth_mail" title="E-mail the corresponding author
;
Futai Zhang
;
a
;
b
;
ffttzhang@sina.com" class="auth_mail" title="E-mail the corresponding author
;
zhangfutai@njnu.edu.cn" class="auth_mail" title="E-mail the corresponding author
;
Jie Zhang
a
;
464516929@qq.com" class="auth_mail" title="E-mail the corresponding author
关键词:
Secret
sharing
;
Verifiable multi-
secret
sharing
scheme
;
Private channel
;
Shadow
;
RSA cryptosystem
刊名:Information Sciences
出版年:2016
7.
Realizing
secret
sharing
with general access structure
作者:
Lein Harn
a
;
b
;
1
;
harnl@umkc.edu" class="auth_mail" title="E-mail the corresponding author
;
Chingfang Hsu
c
;
1
;
cherryjingfang@gmail.com" class="auth_mail" title="E-mail the corresponding author
;
Mingwu Zhang
a
;
csmwzhang@gmail.com" class="auth_mail" title="E-mail the corresponding author
;
Tingting He
c
;
tthe@mail.ccnu.edu.cn" class="auth_mail" title="E-mail the corresponding author
;
Maoyuan Zhang
c
;
zhangmyccnu@126.com" class="auth_mail" title="E-mail the corresponding author
关键词:
General
secret
sharing
;
Chinese remainder theorem
;
Secret
sharing
policy
;
Monotone function
;
Integer optimization
;
Minimal positive access subset
;
Maximal negative access subset
刊名:Information Sciences
出版年:2016
8.
New privilege-based visual cryptography with arbitrary privilege levels
作者:
Ching-Nung Yang
a
;
Jung-Kuo Liao
a
;
Dao-Shun Wang
b
;
c
;
daoshun@mail.tsinghua.edu.cn
关键词:
Visual cryptography
;
Visual
secret
sharing
;
Threshold scheme
;
Privilege level
;
Contrast
刊名:Journal of Visual Communication and Image Representation
出版年:2017
9.
Hierarchical multilevel authentication system for multiple-image based on phase retrieval and basic vector operations
作者:
Xianye Li
a
;
Xiangfeng Meng
a
;
xfmeng@sdu.edu.cn" class="auth_mail" title="E-mail the corresponding author
;
Yongkai Yin
a
;
Xiulun Yang
a
;
Yurong Wang
a
;
Xiang Peng
b
;
Wenqi He
b
;
Xuemei Pan
a
;
Guoyan Dong
c
;
Hongyi Chen
d
关键词:
Image authentication
;
Phase retrieval
;
Secret
sharing
;
Vector decomposition and composition
刊名:Optics and Lasers in Engineering
出版年:2017
10.
DKEM: Secure and efficient Distributed Key Establishment Protocol for Wireless Mesh Networks
作者:
Duygu Karaoğlan Altop
duyguk@sabanciuniv.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Muhammed Ali Bingö
;
l
;
mabingol@sabanciuniv.edu" class="auth_mail" title="E-mail the corresponding author
;
muhammedali.bingol@tubitak.gov.tr" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Albert Levi
levi@sabanciuniv.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
;
Erkay Savaş
erkays@sabanciuniv.edu" class="auth_mail" title="E-mail the corresponding author
Author Vitae
关键词:
Wireless Mesh Networks
;
Key establishment
;
Identity-based cryptography
;
Threshold
secret
sharing
刊名:Ad Hoc Networks
出版年:2017
1
2
3
4
5
6
7
8
9
按检索点细分(523)
题名(245)
关键词(330)
文摘(440)
按出版年细分(523)
2027年及以后(23)
2017年(11)
2016年(40)
2015年(7)
2014年(1)
2013年(34)
2012年(45)
2011年(46)
2010年(45)
2009年(28)
2008年(27)
2007年(41)
2006年(23)
2005年(21)
2004年(30)
2003年(31)
2002年(6)
2001年(6)
2000年(7)
2000年及以前(51)
NGLC 2004-2010.National Geological Library of China All Rights Reserved.
Add:29 Xueyuan Rd,Haidian District,Beijing,PRC. Mail Add: 8324 mailbox 100083
For exchange or info please contact us via
email
.