Funder
National Science Centre, Republic of Poland
Subject
Software,Computer Science Applications,Hardware and Architecture,Computer Networks and Communications,Information Systems
Reference23 articles.
1. Applied Cryptography: Protocols, Algorithms, and Source Code in C;Schneier,1996
2. How to share a secret;Shamir;Commun. ACM,1979
3. Simple secret sharing and threshold RSA signature schemes;Tang;J. Inf. Comput. Sci.,2004
4. Visualization of perfusion abnormalities with GPU-based volume rendering;Hachaj;Comput. Graph. UK,2012
5. Data management in cognitive financial systems;Ogiela;Int. J. Inf. Manage.,2013
Cited by
41 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. E-Health Security on Could Computing and its Challenges;2022 First International Conference on Artificial Intelligence Trends and Pattern Recognition (ICAITPR);2022-03-10
2. Eye Tracking Sensors as a Contactless Interfaces in Wireless Security Protocols;2021 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW);2021-10
3. Cognitive Approach for Creation of Visual Security Codes;Advances in Intelligent Networking and Collaborative Systems;2021-08-07
4. Linguistic methods in healthcare application and COVID-19 variants classification;Neural Computing and Applications;2021-07-06
5. Cognitive Systems in Computing Education;Proceedings of the 26th ACM Conference on Innovation and Technology in Computer Science Education V. 2;2021-06-26