A dynamic key management paradigm for secure wireless ad hoc network communications. | 0 | 0.34 | 2021 |
Mceliece Cryptosystem: Simulation And Security Vulnerabilities | 0 | 0.34 | 2020 |
Differential cryptanalysis on DES cryptosystem up to eight rounds | 1 | 0.38 | 2019 |
Cryptanalysis of a Group Key Transfer Protocol Based on Secret Sharing: Generalization and Countermeasures. | 0 | 0.34 | 2018 |
A Machine Vision Attack Model on Image Based CAPTCHAs Challenge - Large Scale Evaluation. | 0 | 0.34 | 2018 |
CRT based multi-secret sharing schemes: revisited. | 0 | 0.34 | 2018 |
Multi-secret Sharing Scheme for Level-Ordered Access Structures. | 0 | 0.34 | 2017 |
Sequential Secret Sharing Scheme Based on Level Ordered Access Structure. | 0 | 0.34 | 2016 |
New Secret Sharing Scheme For Multipartite Access Structures With Threshold Changeability | 0 | 0.34 | 2015 |
Computationally perfect compartmented secret sharing schemes based on MDS codes. | 0 | 0.34 | 2014 |
Efficient Verifiable Multi-Secret Sharing Based on Y.C.H Scheme. | 1 | 0.36 | 2014 |
Ideal and Computationally Perfect Secret Sharing Schemes for Generalized Access Structures. | 1 | 0.35 | 2014 |
Computationally Perfect Secret Sharing Scheme Based on Error-Correcting Codes. | 2 | 0.41 | 2014 |
Ideal and Perfect Hierarchical Secret Sharing Schemes based on MDS codes. | 3 | 0.43 | 2013 |
Conjunctive Hierarchical Secret Sharing Scheme Based on MDS Codes. | 4 | 0.45 | 2013 |