An improved information rate of perfect secret sharing scheme based on dominating set of vertices
Due to the fast development in data communication systems and computer networks in recent years, the necessity to protect the secret data is of great demands. Several methods have been arisen to protect the secret data; one of them is the secret sharing scheme. It is a method of distributing a secre...
| Main Authors: | Al-Saidi, Nadia M. G., Rajab, N. A., Md. Said, Mohamad Rushdan, Kadhim, K. A. |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2013
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/41348/ http://psasir.upm.edu.my/id/eprint/41348/1/41348.pdf |
Similar Items
Perfect secret sharing scheme based on vertex domination set
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
Blakely’s secret sharing scheme
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Constructing secret sharing schemes based on cyclic
by: Hoo, Mei Hui
Published: (2014)
by: Hoo, Mei Hui
Published: (2014)
Secret sharing scheme for collaborative access system
by: Kadir, Rashidah, et al.
Published: (2000)
by: Kadir, Rashidah, et al.
Published: (2000)
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019)
by: Abd Majid, Noorhafezan
Published: (2019)
Dominating Sets and Domination Polynomials of Graphs
by: Alikhani, Saeid
Published: (2009)
by: Alikhani, Saeid
Published: (2009)
Dominating Sets and Domination Polynomials of Cycles
by: Alikhania, Saeid, et al.
Published: (2008)
by: Alikhania, Saeid, et al.
Published: (2008)
A feedforward compensation scheme for perfect decoupling of measurable input functions
by: Marro, G., et al.
Published: (2010)
by: Marro, G., et al.
Published: (2010)
Future Perfect
by: Chrulew, Matthew
Published: (2017)
by: Chrulew, Matthew
Published: (2017)
A perfect combination
by: Singh, Aftar
Published: (2014)
by: Singh, Aftar
Published: (2014)
A self-healing key distribution scheme based on vector space secret sharing and one way hash chains
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
Perfect evaluation in dental clinic
by: Ahmed Qaid Allaw, Belqees, et al.
Published: (2017)
by: Ahmed Qaid Allaw, Belqees, et al.
Published: (2017)
Perfect Graphs and its Extensions
by: Alex, James
Published: (2025)
by: Alex, James
Published: (2025)
Anthropology of perfection in traditional cosmology
by: Zekrgoo, Amir Hossein
Published: (2012)
by: Zekrgoo, Amir Hossein
Published: (2012)
Truly the perfect golden girls
by: The Star,
Published: (2017)
by: The Star,
Published: (2017)
Zero action on perfect crystals for ********
by: C. Misra, Kailash, et al.
Published: (2010)
by: C. Misra, Kailash, et al.
Published: (2010)
Ustaz Ebit Lew shares the secret to success with UMP residents
by: Nor Salwana, Mohammad Idris
Published: (2021)
by: Nor Salwana, Mohammad Idris
Published: (2021)
Seow Ting Searching For The Perfect Balance
by: Sunday Star,
Published: (2008)
by: Sunday Star,
Published: (2008)
Unconditional security of entanglement-based continuous-variable quantum secret sharing
by: Kogias, Ioannis, et al.
Published: (2017)
by: Kogias, Ioannis, et al.
Published: (2017)
Fingerprinted secret sharing steganography for robustness against image cropping attacks
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
A method of sharing a secret key in quantum key distribution
by: Wan Adnan, Wan Azizun, et al.
Published: (2010)
by: Wan Adnan, Wan Azizun, et al.
Published: (2010)
Islamic advertising: celebrating perfect moral vision
by: Mokhtar, Aida
Published: (2014)
by: Mokhtar, Aida
Published: (2014)
The perfection of the Chinese-style system of the right to silence
by: Meng, Ye
Published: (2024)
by: Meng, Ye
Published: (2024)
Picturing Ideal Space Through Perfect Moments
by: Galvin, Vanessa
Published: (2012)
by: Galvin, Vanessa
Published: (2012)
The algebraic geometry of perfect and sequential equilibrium: an extension
by: Luo, Xiao, et al.
Published: (2020)
by: Luo, Xiao, et al.
Published: (2020)
e-Forensics steganography systems for secret information retrieval
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
AN ENHANCED ANT COLONY OPTIMIZATION METAHEURISTIC FOR THE MINIMUM DOMINATING SET PROBLEM
by: Ho, Chin Kuan, et al.
Published: (2006)
by: Ho, Chin Kuan, et al.
Published: (2006)
Perfect Clar structures and 3-homogeneous simplicial complexes
by: Bier, T
Published: (2002)
by: Bier, T
Published: (2002)
Hypothesis: A perfect day conveys internal time
by: Groß, J., et al.
Published: (2017)
by: Groß, J., et al.
Published: (2017)
The perfect storm: Politics, media and child welfare policy
by: Harrison, C., et al.
Published: (2014)
by: Harrison, C., et al.
Published: (2014)
Sharecropping in perfectly competitive markets: a contradiction in terms
by: Chew, Tek Ann
Published: (1996)
by: Chew, Tek Ann
Published: (1996)
Performance analysis for Secret Message Sharing using different levels of encoding over QSDC
by: Azahari, Nur Shahirah, et al.
Published: (2024)
by: Azahari, Nur Shahirah, et al.
Published: (2024)
SECRET: a secure and efficient certificate revocation scheme for mobile ad hoc networks
by: Mall, Dieynaba, et al.
Published: (2014)
by: Mall, Dieynaba, et al.
Published: (2014)
Complexity and dynamic characteristics of a new discrete-time hyperchaotic model
by: Kadhim, Hayder Natiq, et al.
Published: (2017)
by: Kadhim, Hayder Natiq, et al.
Published: (2017)
The perfection and self-sufficiency of the Qurʾān in the law of inheritance (part one)
by: Tahir, Ibrahim Nuhu
Published: (2015)
by: Tahir, Ibrahim Nuhu
Published: (2015)
The perfection and self-sufficiency of the Qurʾān in the law of inheritance (part two)
by: Tahir, Ibrahim Nuhu
Published: (2015)
by: Tahir, Ibrahim Nuhu
Published: (2015)
Ethics in Islamic finance: Qur'anic guide & consumer perfection
by: Sumairi, Nor Sazwana, et al.
Published: (2017)
by: Sumairi, Nor Sazwana, et al.
Published: (2017)
“A perfect storm”:
an ethnography of pactice in an adult male prison
by: O'Mara, Oscar
Published: (2024)
by: O'Mara, Oscar
Published: (2024)
An interim evaluation of Penang’s first bike-share scheme
by: Nadhrah A Kadir,, et al.
Published: (2019)
by: Nadhrah A Kadir,, et al.
Published: (2019)
A key-predistribution-based weakly connected dominating set for secure clustering in DSN
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
by: Pathan, Al-Sakib Khan, et al.
Published: (2006)
Similar Items
-
Perfect secret sharing scheme based on vertex domination set
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015) -
Blakely’s secret sharing scheme
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011) -
Constructing secret sharing schemes based on cyclic
by: Hoo, Mei Hui
Published: (2014) -
Secret sharing scheme for collaborative access system
by: Kadir, Rashidah, et al.
Published: (2000) -
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019)