Funder
Human Resource Development Group
Publisher
Springer Science and Business Media LLC
Subject
Computer Science Applications,Computer Networks and Communications,Computer Graphics and Computer-Aided Design,Computational Theory and Mathematics,Artificial Intelligence,General Computer Science
Reference33 articles.
1. Chunying W, Shundong L, Yiying Z. Key management scheme based on secret sharing for wireless sensor network. In: Fourth International Conference on Emerging Intelligent Data and Web Technologies (EIDWT); 2013. p. 574–8.
2. Attasena V, Harbi N, Darmont J, et al. Sharing-based privacy and availability of cloud data warehouses. In: 9èmes journées francophones sur les Entrepôts de Données et l’Analyse en ligne; 2006. p. 17–32.
3. Schoenmakers B. A simple publicly verifiable secret sharing scheme and its application to electronic voting. In: Advances in CryptologyCRYPTO99, Springer; 1999. p. 148–64.
4. Stadler M. Publicly verifiable secret sharing. In: Advances in Cryptology EUROCRYPT 96, ser. Lecture Notes in Computer Science, vol. 1070; 1996. p. 190–9.
5. Cramer R, Damgard I, Maurer U. General secure multi-party computation from any linear secret sharing scheme. In: Preneel, B. (ed.) EUROCRYPT 2000, LNCS, vol. 1807; 2000. p. 316–34.