Perfect secret sharing scheme based on vertex domination set
Due to the fast development in data communication systems and computer networks in recent years, the necessity to protect the secret data has become extremely imperative. Several methods have been proposed to protect the secret data; one of them is the secret sharing scheme. It is a method of distri...
| Main Authors: | Al-Saidi, Nadia Mohammed Ghanim, Rajab, N. A., Md. Said, Mohamad Rushdan, Kadhim, K. A. |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
Taylor and Francis
2015
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/45803/ http://psasir.upm.edu.my/id/eprint/45803/1/RANK.pdf |
Similar Items
An improved information rate of perfect secret sharing scheme based on dominating set of vertices
by: Al-Saidi, Nadia M. G., et al.
Published: (2013)
by: Al-Saidi, Nadia M. G., et al.
Published: (2013)
Bounds on the order of connected domination vertex critical graphs
by: Kaemawichanurat, P., et al.
Published: (2018)
by: Kaemawichanurat, P., et al.
Published: (2018)
On minimum cutsets in independent domination vertex-critical graphs
by: Ananchuen, N., et al.
Published: (2018)
by: Ananchuen, N., et al.
Published: (2018)
Blakely’s secret sharing scheme
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
Constructing secret sharing schemes based on cyclic
by: Hoo, Mei Hui
Published: (2014)
by: Hoo, Mei Hui
Published: (2014)
Secret sharing scheme for collaborative access system
by: Kadir, Rashidah, et al.
Published: (2000)
by: Kadir, Rashidah, et al.
Published: (2000)
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019)
by: Abd Majid, Noorhafezan
Published: (2019)
Complexity and dynamic characteristics of a new discrete-time hyperchaotic model
by: Kadhim, Hayder Natiq, et al.
Published: (2017)
by: Kadhim, Hayder Natiq, et al.
Published: (2017)
Dominating Sets and Domination Polynomials of Graphs
by: Alikhani, Saeid
Published: (2009)
by: Alikhani, Saeid
Published: (2009)
Dominating Sets and Domination Polynomials of Cycles
by: Alikhania, Saeid, et al.
Published: (2008)
by: Alikhania, Saeid, et al.
Published: (2008)
A new approach in cryptographic systems using fractal image coding
by: Mohammed Ghanim Al - Saidi, Nadia, et al.
Published: (2009)
by: Mohammed Ghanim Al - Saidi, Nadia, et al.
Published: (2009)
A new idea in zero knowledge protocols based on iterated function systems
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2011)
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2011)
A feedforward compensation scheme for perfect decoupling of measurable input functions
by: Marro, G., et al.
Published: (2010)
by: Marro, G., et al.
Published: (2010)
Future Perfect
by: Chrulew, Matthew
Published: (2017)
by: Chrulew, Matthew
Published: (2017)
Hybrid vertex-midline modelling of elongated plant organs
by: Fozard, John A., et al.
Published: (2016)
by: Fozard, John A., et al.
Published: (2016)
Max degree around (MDA) algorithm: a smart and efficient approximate algorithm for Vertex cover and independent set problems
by: Fayaz, Muhammad, et al.
Published: (2016)
by: Fayaz, Muhammad, et al.
Published: (2016)
An evolutionary algorithm for graph planarisation by vertex deletion
by: Pinheiro, Rodrigo Lankaites, et al.
Published: (2014)
by: Pinheiro, Rodrigo Lankaites, et al.
Published: (2014)
A perfect combination
by: Singh, Aftar
Published: (2014)
by: Singh, Aftar
Published: (2014)
Vertex-element models for anisotropic growth of elongated plant organs
by: Fozard, John A., et al.
Published: (2013)
by: Fozard, John A., et al.
Published: (2013)
Perfect evaluation in dental clinic
by: Ahmed Qaid Allaw, Belqees, et al.
Published: (2017)
by: Ahmed Qaid Allaw, Belqees, et al.
Published: (2017)
An Improved of Channel Allocation for WLAN Using Vertex Merge Algorithm
by: Mr, Handrizal, et al.
Published: (2012)
by: Mr, Handrizal, et al.
Published: (2012)
DNA Computing Technique to Solve Vertex Coloring Problem
by: Hasudungan, Rofilde, et al.
Published: (2013)
by: Hasudungan, Rofilde, et al.
Published: (2013)
Neural network corner detection of vertex chain code
by: Subri, S. H., et al.
Published: (2006)
by: Subri, S. H., et al.
Published: (2006)
On rainbow vertex antimagic coloring and its application to the encryption keystream construction
by: Agustin, Ika Hesti, et al.
Published: (2024)
by: Agustin, Ika Hesti, et al.
Published: (2024)
A new 2D Hénon-logistic map for producing hyperchaotic behavior
by: Hussein, Wafaa A., et al.
Published: (2018)
by: Hussein, Wafaa A., et al.
Published: (2018)
A generalized fractal dimension as an image feature
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
An improved fuzzy fractal dimension for texture analysis
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
by: Al-Saidi, Nadia Mohammed Ghanim, et al.
Published: (2015)
A self-healing key distribution scheme based on vector space secret sharing and one way hash chains
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
Perfect Graphs and its Extensions
by: Alex, James
Published: (2025)
by: Alex, James
Published: (2025)
Anthropology of perfection in traditional cosmology
by: Zekrgoo, Amir Hossein
Published: (2012)
by: Zekrgoo, Amir Hossein
Published: (2012)
Truly the perfect golden girls
by: The Star,
Published: (2017)
by: The Star,
Published: (2017)
Zero action on perfect crystals for ********
by: C. Misra, Kailash, et al.
Published: (2010)
by: C. Misra, Kailash, et al.
Published: (2010)
Neural network in corner detection of vertex chain code series
by: Subri, S. H., et al.
Published: (2006)
by: Subri, S. H., et al.
Published: (2006)
Ustaz Ebit Lew shares the secret to success with UMP residents
by: Nor Salwana, Mohammad Idris
Published: (2021)
by: Nor Salwana, Mohammad Idris
Published: (2021)
Comparison of yield-vertex tangential loading and principal stress rotational loading
by: Lu, Nan, et al.
Published: (2019)
by: Lu, Nan, et al.
Published: (2019)
Multi-speaker separation employing microphone array and vertex finding algorithm
by: Hong Dam, H., et al.
Published: (2018)
by: Hong Dam, H., et al.
Published: (2018)
Seow Ting Searching For The Perfect Balance
by: Sunday Star,
Published: (2008)
by: Sunday Star,
Published: (2008)
Competitive improvement of the time complexity to encode fractal image: by applying symmetric central pixel of the block
by: Md Ahadullah, et al.
Published: (2021)
by: Md Ahadullah, et al.
Published: (2021)
Unconditional security of entanglement-based continuous-variable quantum secret sharing
by: Kogias, Ioannis, et al.
Published: (2017)
by: Kogias, Ioannis, et al.
Published: (2017)
Fingerprinted secret sharing steganography for robustness against image cropping attacks
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Similar Items
-
An improved information rate of perfect secret sharing scheme based on dominating set of vertices
by: Al-Saidi, Nadia M. G., et al.
Published: (2013) -
Bounds on the order of connected domination vertex critical graphs
by: Kaemawichanurat, P., et al.
Published: (2018) -
On minimum cutsets in independent domination vertex-critical graphs
by: Ananchuen, N., et al.
Published: (2018) -
Blakely’s secret sharing scheme
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011) -
Constructing secret sharing schemes based on cyclic
by: Hoo, Mei Hui
Published: (2014)