User Multi Group Key Distribution Using Secret Sharing with Circulate Matrices Based on Diophantine Equation and Ecdh Key Exchange Protocol
ET Alghareeb, V Osipyan - Informatica, 2023 - informatica.si
The majority of currently used conventional group key distribution protocols are primarily
created for a single group. But group communications are becoming more and more popular …
created for a single group. But group communications are becoming more and more popular …
[PDF][PDF] User Multi Group Key Distribution Using Secret Sharing with Circulate Matrices Based on Structures Pythagors Equation and Ecdh Key Exchange Protocol
E Talib, V Osipyan - Informatica, 2023 - researchgate.net
Enter short title in File/Properties/Summary Page 1 https://doi.org/10.31449/inf.v47i5.4658
Informatica 47 (2023) 127–136 127 User Multi Group Key Distribution Using Secret Sharing …
Informatica 47 (2023) 127–136 127 User Multi Group Key Distribution Using Secret Sharing …
Verifiable Secret Key Sharing Scheme Based on Threshold Cryptosystem
C Zhao, J Chen, J Ye - … on Cognitive based Information Processing and …, 2023 - Springer
The security of a key often determines the security of a communication system, so a secure
and effective key distribution management method can effectively ensure the security of the …
and effective key distribution management method can effectively ensure the security of the …
Enhanced Privacy with Blockchain-based Storage for Data Sharing
YF Lu, HM Chen, CF Kuo, BT Chen… - Proceedings of the …, 2020 - dl.acm.org
The core concept of electronic money is blockchain, which can be regarded as a
decentralized database. It is a decentralized storage service that does not rely on third-party …
decentralized database. It is a decentralized storage service that does not rely on third-party …
Unapredjenje protokola za razmenu ključeva na bazi ličnih identifikacionih dokumenata pošiljaoca i primaoca
A Mišković - Универзитет Сингидунум, 2020 - nardus.mpn.gov.rs
Предмет рада докторске дисертације је сагледавање актуелних проблема везаних за
појмове размена криптографских кључева и аутентификација корисника система за …
појмове размена криптографских кључева и аутентификација корисника система за …
Threshold Changeable Secret Sharing Scheme and Its Application to Group Authentication
F Miao, Y Yu, K Meng, W Huang, Y Xiong - arXiv preprint arXiv …, 2019 - arxiv.org
Group oriented applications are getting more and more popular in mobile Internet and call
for secure and efficient secret sharing (SS) scheme to meet their requirements. A $(t, n) …
for secure and efficient secret sharing (SS) scheme to meet their requirements. A $(t, n) …
Унапређење протокола за размену кључева на бази личних идентификационих докумената пошиљаоца и примаоца
A Mišković - 2019 - search.proquest.com
Предмет рада докторске дисертације је сагледавање актуелних проблема везаних за
појмове размена криптографских кључева и аутентификација корисника система за …
појмове размена криптографских кључева и аутентификација корисника система за …