Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
Sci2ools
International Keyboard
Graphical Social Symbols
CSS3 Style Generator
OCR
Web Page to Image
Web Page to PDF
Merge PDF
Split PDF
Latex Equation Editor
Extract Images from PDF
Convert JPEG to PS
Convert Latex to Word
Convert Word to PDF
Image Converter
PDF Converter
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
380
search results - page 5 / 76
»
Intrusion-Resilient Secret Sharing
Sort
relevance
views
votes
recent
update
View
thumb
title
21
click to vote
DCC
2000
IEEE
112
views
Computer Graphics
»
more
DCC 2000
»
New Colored Visual Secret Sharing Schemes
13 years 9 months ago
Download
msn.iecs.fcu.edu.tw
Ching-Nung Yang, Chi-Sung Laih
claim paper
Read More »
23
click to vote
CORR
2002
Springer
117
views
Education
»
more
CORR 2002
»
On the graph coloring check-digit scheme with applications to verifiable secret sharing
13 years 9 months ago
Download
www.ippt.gov.pl
Kamil Kulesza, Zbigniew Kotulski
claim paper
Read More »
16
click to vote
ISCI
2010
79
views
more
ISCI 2010
»
Strong (n, t, n) verifiable secret sharing scheme
13 years 8 months ago
Download
h.web.umkc.edu
Lein Harn, Changlu Lin
claim paper
Read More »
21
click to vote
PR
2010
116
views
more
PR 2010
»
Secret image sharing based on cellular automata and steganography
13 years 8 months ago
Download
www.sbu.ac.ir
Z. Eslami, S. H. Razzaghi, J. Zarepour Ahmadabadi
claim paper
Read More »
24
click to vote
ICITS
2009
60
views
Security Privacy
»
more
ICITS 2009
»
On the Optimization of Bipartite Secret Sharing Schemes
13 years 7 months ago
Download
www1.spms.ntu.edu.sg
Oriol Farràs, Jessica Ruth Metcalf-Burton, ...
claim paper
Read More »
« Prev
« First
page 5 / 76
Last »
Next »