A review on several critical issues and challenges in IoT based e-healthcare system
Due to recent development in smart/electronic devices or computing devices, a lot of data
(called Big Data) is being generated. This data in simple terms is called as" Large Data" or" …
(called Big Data) is being generated. This data in simple terms is called as" Large Data" or" …
Secret sharing scheme for group authentication—A review
SK Narad, MR Sayankar, SV Alone… - 2017 International …, 2017 - ieeexplore.ieee.org
User authentication is the most important security services for communication purpose.
Group Authentication authenticates all users belonging to the same group is proposed in …
Group Authentication authenticates all users belonging to the same group is proposed in …
Distributed secret sharing scheme based on the high-dimensional rotation paraboloid
S Qin, Z Tan, B Zhang, F Zhou - Journal of Information Security and …, 2021 - Elsevier
Secret sharing of (k, n)-threshold is naturally used to assist in security-assurance
applications in smart systems. It can ensure a high level of data security and reliability. Most …
applications in smart systems. It can ensure a high level of data security and reliability. Most …
Neural network based group authentication using (n, n) secret sharing scheme
In recent days, usage of internet is increasing so; authentication becomes the most important
security services for communication purpose. Keeping this into consideration, there is need …
security services for communication purpose. Keeping this into consideration, there is need …
Vector space multisecret-sharing scheme based on Blakley's method
S Çalkavur, P Solé - 1st International Conference on Frontiers of …, 2023 - hal.science
Secret sharing schemes were introduced by Adi Shamir and George Blakley, independently,
in 1979. In a $(k, n) $-threshold secret sharing scheme, any set of at least $ k $ out of $ n …
in 1979. In a $(k, n) $-threshold secret sharing scheme, any set of at least $ k $ out of $ n …
Signature restoration for enhancing robustness of fpga ip designs
J Long, D Zhang, W Liang - International Journal of Information …, 2015 - igi-global.com
Many watermarking techniques for intellectual property (IP) protection are not resilient to
tampering or removal attacks, especially for field programmable gate array (FPGA)-based IP …
tampering or removal attacks, especially for field programmable gate array (FPGA)-based IP …
Threshold secret sharing through multivariate Birkhoff interpolation
VE Markoutis, GC Meletiou, AN Veneti… - … , and Network Security, 2015 - Springer
Secret sharing schemes have been well studied and widely used in different aspects of real
life applications. The original secret sharing scheme was proposed by Adi Shamir in 1979. A …
life applications. The original secret sharing scheme was proposed by Adi Shamir in 1979. A …
A Fault-Tolerant Watermarking Algorithm for FPGA IP Protection
J Long, D Zhang, W Liang, W Li - 2015 IEEE Trustcom …, 2015 - ieeexplore.ieee.org
Intellectual Property (IP) is difficult to identify when the watermarks are impaired in previous
work. To address this issue, we propose a fault-tolerant watermarking scheme for FPGA IP …
work. To address this issue, we propose a fault-tolerant watermarking scheme for FPGA IP …
A distributed login framework for semi-structured Peer-to-Peer networks
In Peer-to-Peer (P2P) networks, security is a challenging issue due to decentralization. In
this paper, we propose an effective distributed login framework for P2P networks. User …
this paper, we propose an effective distributed login framework for P2P networks. User …
An Efficient and Secure Weighted Threshold Signcryption Scheme
CH Tsai - Journal of Internet Technology, 2019 - jit.ndhu.edu.tw
Threshold cryptosystems are well suited for the application of group-oriented collaborations
which is of such a nature that specific cooperation should be established in connection with …
which is of such a nature that specific cooperation should be established in connection with …