Secret sharing scheme for collaborative access system
This research investigate the concept of secret sharing scheme based on Shamir's secret sharing. The goal of this research is to implement secret sharing scheme for collaborative access system which are ideally suited to application in which a group of mutually suspicious individuals with confl...
| Main Authors: | Kadir, Rashidah, Maarof, Mohd. Aizaini |
|---|---|
| Format: | Conference or Workshop Item |
| Language: | English |
| Published: |
2000
|
| Subjects: | |
| Online Access: | http://eprints.utm.my/10958/ http://eprints.utm.my/10958/1/RashidahKadir2000_SecretSharingSchemeForCollaborativeAccess.pdf |
Similar Items
Constructing secret sharing schemes based on cyclic
by: Hoo, Mei Hui
Published: (2014)
by: Hoo, Mei Hui
Published: (2014)
SECRET: a secure and efficient certificate revocation scheme for mobile ad hoc networks
by: Mall, Dieynaba, et al.
Published: (2014)
by: Mall, Dieynaba, et al.
Published: (2014)
A binary access control scheme with high data security.
by: Islam, Md. Rafiqul, et al.
Published: (2002)
by: Islam, Md. Rafiqul, et al.
Published: (2002)
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019)
by: Abd Majid, Noorhafezan
Published: (2019)
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)
by: Zainal, Anazida, et al.
Published: (2008)
Dual Access Control for Cloud Storage and Sharing
by: Sandeep, T.S., et al.
Published: (2024)
by: Sandeep, T.S., et al.
Published: (2024)
Diffusion analysis of EFN-MDS structure
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
A Review on Biological Inspired Computation in Cryptology
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Symmetric Key Size for Different Level of Information Classification
by: Ibrahim, Subariah, et al.
Published: (2006)
by: Ibrahim, Subariah, et al.
Published: (2006)
Cryptanalysis using biological inspired computing approaches
by: Ahmad, Badrisham, et al.
Published: (2006)
by: Ahmad, Badrisham, et al.
Published: (2006)
Modified key size determination models for symmetric ciphers
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Diffusion analysis af a scalable fiestel network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Detection of DoS attacks using intrusion detection sensors
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
by: Maarof, Mohd. Aizaini, et al.
Published: (2002)
A Data-driven Sigmoid-based Secretion Rate of Neuroendocrine-PID Control for TRMS System
by: Mohd Riduwan, Ghazali, et al.
Published: (2021)
by: Mohd Riduwan, Ghazali, et al.
Published: (2021)
A survey on the cryptanalysis of the advanced encryption standard
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
by: Z’aba, Muhammad Reza, et al.
Published: (2006)
A novel secret key generation based on image link
by: Sulaiman, Alyaa Ghanim, et al.
Published: (2018)
by: Sulaiman, Alyaa Ghanim, et al.
Published: (2018)
A protocol for secret key infusion from satellite transmissions
by: Wahiddin, Mohamed Ridza, et al.
Published: (2010)
by: Wahiddin, Mohamed Ridza, et al.
Published: (2010)
The optimization of stepping stone detection : packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
The optimization of stepping stone detection: Packet capturing steps
by: Omar, Mohd Nizam, et al.
Published: (2006)
by: Omar, Mohd Nizam, et al.
Published: (2006)
Solving time gap problems through the optimization of detecting stepping stone algorithm
by: Omar, Mohd. Nizam, et al.
Published: (2004)
by: Omar, Mohd. Nizam, et al.
Published: (2004)
Research issues in adaptive intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
The optimization of stepping stone detection: packet capturing steps
by: Omar, Mohd. Nizam, et al.
Published: (2006)
by: Omar, Mohd. Nizam, et al.
Published: (2006)
How AIS Addresses Adaptability in IDS
by: Zainal, Anazida, et al.
Published: (2005)
by: Zainal, Anazida, et al.
Published: (2005)
Feature selection using rough set in intrusion detection
by: Zainal, Anazida, et al.
Published: (2006)
by: Zainal, Anazida, et al.
Published: (2006)
Avalanche Analysis of Extended Feistel Network
by: Ibrahim, Subariah, et al.
Published: (2005)
by: Ibrahim, Subariah, et al.
Published: (2005)
Finding granular features using rough-PSO in IDS
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Feature selection using rough-dpso in anomaly intrusion detection
by: Zainal, Anazida, et al.
Published: (2007)
by: Zainal, Anazida, et al.
Published: (2007)
Security awareness: A lesson from Tcpdump and Ethereal
by: Rohani, Mohd. Fo’ad, et al.
Published: (2005)
by: Rohani, Mohd. Fo’ad, et al.
Published: (2005)
Iterative window size estimation on self-similarity measurement for network traffic anomaly detection
by: Idris, Mohd. Yazid, et al.
Published: (2004)
by: Idris, Mohd. Yazid, et al.
Published: (2004)
Fast optimization method : the window size and hurst parameter estimator on self-similar network traffic
by: Idris, Mohd. Yazid, et al.
Published: (2007)
by: Idris, Mohd. Yazid, et al.
Published: (2007)
Ensemble based categorization and adaptive model for malware detection
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2011)
by: Ahmad Zabidi, Muhammad Najmi, et al.
Published: (2011)
Collaborative knowledge management systems for learning organisations
by: Abdullah, Rusli, et al.
Published: (2005)
by: Abdullah, Rusli, et al.
Published: (2005)
Office collaboration system
by: Ishak, Azimah
Published: (2005)
by: Ishak, Azimah
Published: (2005)
Proposal of successive interference cancellation scheme in optical code-division multiple access systems
by: Eltaif, Tawfig, et al.
Published: (2008)
by: Eltaif, Tawfig, et al.
Published: (2008)
Collaborative Filtering Recommender System: Overview and Challenges
by: Al-Bashiri, Hael, et al.
Published: (2017)
by: Al-Bashiri, Hael, et al.
Published: (2017)
High security Iris verification system based on random secret integration
by: SIEWCHIN, C, et al.
Published: (2006)
by: SIEWCHIN, C, et al.
Published: (2006)
Implementation and recent progress in cloud-based smart home automation systems
by: Katuk, Norliza, et al.
Published: (2018)
by: Katuk, Norliza, et al.
Published: (2018)
Door Access System via Fingerprint with GSM (ReSMART)
by: Muhamad Hafizuddin, Afiq Anuar, et al.
Published: (2016)
by: Muhamad Hafizuddin, Afiq Anuar, et al.
Published: (2016)
A secure data outsourcing scheme based on Asmuth–Bloom secret sharing
by: Muhammad, Yusuf Idris, et al.
Published: (2016)
by: Muhammad, Yusuf Idris, et al.
Published: (2016)
Detecting and preventing unauthorised computer access on a physical network system
by: Mohd. Shariff, Muhammad Reza
Published: (2008)
by: Mohd. Shariff, Muhammad Reza
Published: (2008)
Similar Items
-
Constructing secret sharing schemes based on cyclic
by: Hoo, Mei Hui
Published: (2014) -
SECRET: a secure and efficient certificate revocation scheme for mobile ad hoc networks
by: Mall, Dieynaba, et al.
Published: (2014) -
A binary access control scheme with high data security.
by: Islam, Md. Rafiqul, et al.
Published: (2002) -
Secret sharing scheme for key management of secure data sharing in cloud
by: Abd Majid, Noorhafezan
Published: (2019) -
Class specific features for attacks in network intrusion detection system
by: Zainal, Anazida, et al.
Published: (2008)