Sciweavers
Explore
Publications
Books
Software
Tutorials
Presentations
Lectures Notes
Datasets
Labs
Conferences
Community
Upcoming
Conferences
Top Ranked Papers
Most Viewed Conferences
Conferences by Acronym
Conferences by Subject
Conferences by Year
Tools
PDF Tools
Image Tools
Text Tools
OCR Tools
Symbol and Emoji Tools
On-screen Keyboard
Latex Math Equation to Image
Smart IPA Phonetic Keyboard
Community
Sciweavers
About
Terms of Use
Privacy Policy
Cookies
977
search results - page 22 / 196
»
Secret image sharing
Sort
relevance
views
votes
recent
update
View
thumb
title
94
click to vote
CRYPTO
1991
Springer
103
views
Cryptology
»
more
CRYPTO 1991
»
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
15 years 6 months ago
Download
www.cs.huji.ac.il
Torben P. Pedersen
claim paper
Read More »
138
click to vote
DAC
2008
ACM
139
views
Computer Architecture
»
more
DAC 2008
»
Protecting bus-based hardware IP by secret sharing
15 years 4 months ago
Download
www.eecs.umich.edu
Our work addresses protection of hardware IP at the mask level with the goal of preventing unauthorized manufacturing. The proposed protocol based on chip locking and activation i...
Jarrod A. Roy, Farinaz Koushanfar, Igor L. Markov
claim paper
Read More »
110
click to vote
AMC
2005
122
views
more
AMC 2005
»
A secret sharing scheme based on cellular automata
15 years 3 months ago
Download
www.sysengi.com
Ángel Martín del Rey, J. Pereira Mat...
claim paper
Read More »
94
click to vote
DCC
2000
IEEE
112
views
Computer Graphics
»
more
DCC 2000
»
New Colored Visual Secret Sharing Schemes
15 years 2 months ago
Download
msn.iecs.fcu.edu.tw
Ching-Nung Yang, Chi-Sung Laih
claim paper
Read More »
86
click to vote
CORR
2002
Springer
117
views
Education
»
more
CORR 2002
»
On the graph coloring check-digit scheme with applications to verifiable secret sharing
15 years 2 months ago
Download
www.ippt.gov.pl
Kamil Kulesza, Zbigniew Kotulski
claim paper
Read More »
« Prev
« First
page 22 / 196
Last »
Next »