Constructing secret sharing schemes based on cyclic
| Main Author: | Hoo, Mei Hui |
|---|---|
| Format: | Final Year Project / Dissertation / Thesis |
| Published: |
2014
|
| Subjects: | |
| Online Access: | http://eprints.utar.edu.my/1352/ http://eprints.utar.edu.my/1352/1/AM%2D2014%2D1100118%2D1.pdf |
Similar Items
Secret sharing scheme for collaborative access system
by: Kadir, Rashidah, et al.
Published: (2000)
by: Kadir, Rashidah, et al.
Published: (2000)
SECRET: a secure and efficient certificate revocation scheme for mobile ad hoc networks
by: Mall, Dieynaba, et al.
Published: (2014)
by: Mall, Dieynaba, et al.
Published: (2014)
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019)
by: Abd Majid, Noorhafezan
Published: (2019)
A novel secret key generation based on image link
by: Sulaiman, Alyaa Ghanim, et al.
Published: (2018)
by: Sulaiman, Alyaa Ghanim, et al.
Published: (2018)
A Data-driven Sigmoid-based Secretion Rate of Neuroendocrine-PID Control for TRMS System
by: Mohd Riduwan, Ghazali, et al.
Published: (2021)
by: Mohd Riduwan, Ghazali, et al.
Published: (2021)
A protocol for secret key infusion from satellite transmissions
by: Wahiddin, Mohamed Ridza, et al.
Published: (2010)
by: Wahiddin, Mohamed Ridza, et al.
Published: (2010)
Feature Adaptive and Cyclic Dynamic Learning Based on Infinite Term Memory Extreme Learning Machine
by: Al-Khaleefa, Ahmed Salih, et al.
Published: (2019)
by: Al-Khaleefa, Ahmed Salih, et al.
Published: (2019)
A secure data outsourcing scheme based on Asmuth–Bloom secret sharing
by: Muhammad, Yusuf Idris, et al.
Published: (2016)
by: Muhammad, Yusuf Idris, et al.
Published: (2016)
Comparison and fusion of retrieval schemes based on different structures, similarity measures and weighting schemes
by: Wahlan, Mohammed Salem Farag
Published: (2006)
by: Wahlan, Mohammed Salem Farag
Published: (2006)
Ecological and confined domain ontology construction scheme using concept clustering for knowledge management
by: Mahmood, Khalid, et al.
Published: (2023)
by: Mahmood, Khalid, et al.
Published: (2023)
High security Iris verification system based on random secret integration
by: SIEWCHIN, C, et al.
Published: (2006)
by: SIEWCHIN, C, et al.
Published: (2006)
The impact of file sharing based on the peer-to-peer technology
by: Raja Shaharuddin, Raja Aida, et al.
Published: (2002)
by: Raja Shaharuddin, Raja Aida, et al.
Published: (2002)
Strategies to improve knowledge sharing in trading construction organization
by: Lee, Angela Siew Hoong *, et al.
Published: (2017)
by: Lee, Angela Siew Hoong *, et al.
Published: (2017)
Blakely’s secret sharing scheme
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
by: Mahmood Al Dabbagh, Sufyan Salim, et al.
Published: (2011)
An Improved Image Steganography Scheme Based on RDWT and QR Decomposition
by: Ng, Ke-Huey, et al.
Published: (2020)
by: Ng, Ke-Huey, et al.
Published: (2020)
Algorithm Design of Digital Watermarking Scheme for Multi-frames Medical Images
by: Khor, Hui Liang, et al.
Published: (2015)
by: Khor, Hui Liang, et al.
Published: (2015)
An Adaptive Handover Prediction Scheme for Seamless Mobility based-Wireless Networks
by: Sadiq, Ali Safa, et al.
Published: (2014)
by: Sadiq, Ali Safa, et al.
Published: (2014)
SDAW: secure data aggregation watermarking-based scheme in homogeneous WSNs
by: Boubiche, Djallel Eddine, et al.
Published: (2015)
by: Boubiche, Djallel Eddine, et al.
Published: (2015)
Generating finite cyclic and dihedral groups using sequential insertion systems with interactions
by: Fong, Wan Heng, et al.
Published: (2017)
by: Fong, Wan Heng, et al.
Published: (2017)
Comparison of retrieval schemes based on different structure and similarity measures for Malaysia's fatwa
by: Ibrahim, Mohd. Nazri
Published: (2007)
by: Ibrahim, Mohd. Nazri
Published: (2007)
Joint channel selection and cluster-based routing scheme based on reinforcement learning for cognitive radio networks
by: Yasir Saleem, *, et al.
Published: (2015)
by: Yasir Saleem, *, et al.
Published: (2015)
A new tv-based database encryption scheme using ts block cipher
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
by: Mohamed Sidek, Zailani, et al.
Published: (2004)
Modelling immune systems responses for the development of energy sharing strategies for swarm robotic systems
by: Al Haek, Mohammed, et al.
Published: (2014)
by: Al Haek, Mohammed, et al.
Published: (2014)
Understanding the use of knowledge sharing tools
by: Lee, Angela Siew Hoong *, et al.
Published: (2020)
by: Lee, Angela Siew Hoong *, et al.
Published: (2020)
The evolution and trend of chain code scheme
by: Wulandhari, Lily Ayu, et al.
Published: (2008)
by: Wulandhari, Lily Ayu, et al.
Published: (2008)
Reversible Watermarking Based on Sorting Prediction Scheme
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
by: Fakhreldin, Mohammed Adam Ibrahim, et al.
Published: (2014)
Reversible data hiding scheme based on 3-Least significant bits and mix column transform
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
by: Abduallah, Wafaa Mustafa, et al.
Published: (2013)
Efficient algorithms for the key representation auditing scheme.
by: Asim Abdallah, Elshiekh, et al.
Published: (2009)
by: Asim Abdallah, Elshiekh, et al.
Published: (2009)
On the key revocation schemes in wireless sensor networks
by: Mall, Dieynaba, et al.
Published: (2013)
by: Mall, Dieynaba, et al.
Published: (2013)
Inter-cluster synchronization scheme for femtocell network
by: Hasan, M.K., et al.
Published: (2012)
by: Hasan, M.K., et al.
Published: (2012)
An adaptive scaling factor for multiple watermarking scheme
by: Dhani, Ariatmanto, et al.
Published: (2019)
by: Dhani, Ariatmanto, et al.
Published: (2019)
A Review of Medical Image Watermarking Schemes
by: Jasni, Mohamad Zain, et al.
Published: (2009)
by: Jasni, Mohamad Zain, et al.
Published: (2009)
A lightweight identity-based Rivest-Shamir-Adleman authentication scheme for mobile ad hoc networks
by: Eissa, Tameem
Published: (2011)
by: Eissa, Tameem
Published: (2011)
Problem-based learning information sharing system / Suriani Abd. Aziz
by: Suriani , Abd. Aziz
Published: (2003)
by: Suriani , Abd. Aziz
Published: (2003)
Performance evaluation of wavelet SVD-based watermarking schemes for color images
by: Rassem, Taha H., et al.
Published: (2020)
by: Rassem, Taha H., et al.
Published: (2020)
Performance Evaluation of SVD-based Digital Image Watermarking Scheme on Print-Scan and Print-Cam (PSPC) Applications
by: Makbol, Nasrin M., et al.
Published: (2014)
by: Makbol, Nasrin M., et al.
Published: (2014)
Press Touch Code: A Finger Press based Screen Size Independent Authentication Scheme for Smart Devices
by: Ranak, M. S. A. Noman, et al.
Published: (2017)
by: Ranak, M. S. A. Noman, et al.
Published: (2017)
Simplified link reliability enhancement schemes for wireless networks
by: Boon, Hoi Lim, et al.
Published: (2009)
by: Boon, Hoi Lim, et al.
Published: (2009)
Optimal cooperative MIMO scheme in wireless sensor networks
by: Ahmad, Mohd Riduan, et al.
Published: (2010)
by: Ahmad, Mohd Riduan, et al.
Published: (2010)
Sistem pengesanan dan pembetulan ralat menggunakan teknik Hamming Codes dan Cyclic Redundency Check (CRC) (Decoder) / Wan Ramlah Wan Ibrahim
by: Wan Ramlah, Wan Ibrahim
Published: (2002)
by: Wan Ramlah, Wan Ibrahim
Published: (2002)
Similar Items
-
Secret sharing scheme for collaborative access system
by: Kadir, Rashidah, et al.
Published: (2000) -
SECRET: a secure and efficient certificate revocation scheme for mobile ad hoc networks
by: Mall, Dieynaba, et al.
Published: (2014) -
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019) -
A novel secret key generation based on image link
by: Sulaiman, Alyaa Ghanim, et al.
Published: (2018) -
A Data-driven Sigmoid-based Secretion Rate of Neuroendocrine-PID Control for TRMS System
by: Mohd Riduwan, Ghazali, et al.
Published: (2021)