
Search dblp
Full-text search
- > Home
Please enter a search query
- case-insensitive prefix search: default
e.g., sig matches "SIGIR" as well as "signal" - exact word search: append dollar sign ($) to word
e.g., graph$ matches "graph", but not "graphics" - boolean and: separate words by space
e.g., codd model - boolean or: connect words by pipe symbol (|)
e.g., graph|network
Update May 7, 2017: Please note that we had to disable the phrase search operator (.) and the boolean not operator (-) due to technical problems. For the time being, phrase search queries will yield regular prefix search result, and search terms preceded by a minus will be interpreted as regular (positive) search terms.
Author search results
no matches
Venue search results
no matches
Refine list
refine by author
- no options
- temporarily not available
refine by venue
- no options
- temporarily not available
refine by type
- no options
- temporarily not available
refine by year
- no options
- temporarily not available
Publication search results
found 256 matches
- 2021
- John Liagouris, Vasiliki Kalavri, Muhammad Faisal, Mayank Varia:
Secrecy: Secure collaborative analytics on secret-shared data. CoRR abs/2102.01048 (2021) - Kiavash Satvat, Maliheh Shirvanian, Nitesh Saxena:
PASSAT: Single Password Authenticated Secret-Shared Intrusion-Tolerant Storage with Server Transparency. CoRR abs/2102.13607 (2021) - Thomas Yurek, Licheng Luo, Jaiden Fairoze, Aniket Kate, Andrew K. Miller:
hbACSS: How to Robustly Share Many Secrets. IACR Cryptol. ePrint Arch. 2021: 159 (2021) - 2020
- A. Francis Saviour Devaraj, G. Murugaboopathi, Mohamed Elhoseny
, K. Shankar
, Kyungbok Min, Hyeonjoon Moon
, Gyanendra Prasad Joshi
:
An Efficient Framework for Secure Image Archival and Retrieval System Using Multiple Secret Share Creation Scheme. IEEE Access 8: 144310-144320 (2020) - Mariko Fujii, Tomoharu Shibuya:
Improvement of the Quality of Visual Secret Sharing Schemes with Constraints on the Usage of Shares. IEICE Trans. Inf. Syst. 103-D(1): 11-24 (2020) - Prashanti Guttikonda, Nirupama Mundukur:
Secret Sharing with Reduced Share Size and Data Integrity. Ingénierie des Systèmes d Inf. 25(2): 227-237 (2020) - Ayushi Agarwal, Maroti Deshmukh, Maheep Singh
:
Object detection framework to generate secret shares. Multim. Tools Appl. 79(33-34): 24685-24706 (2020) - Adnan Gutub
, Maimoona Al-Ghamdi:
Hiding shares by multimedia image steganography for optimized counting-based secret sharing. Multim. Tools Appl. 79(11-12): 7951-7985 (2020) - Fabian Schillinger
, Christian Schindelhauer
:
Crucial and Redundant Shares and Compartments in Secret Sharing. AICCSA 2020: 1-7 - Melissa Chase, Esha Ghosh, Oxana Poburinnaya:
Secret-Shared Shuffle. ASIACRYPT (3) 2020: 342-372 - Antonino Galletta, Maria Fazio, Antonio Celesti, Massimo Villari:
Verifiable Secret Share for file storage with cheater identification. CCGRID 2020: 788-793 - Hubert Comon, Charlie Jacomme, Guillaume Scerri:
Oracle Simulation: A Technique for Protocol Composition with Long Term Shared Secrets. CCS 2020: 1427-1444 - Payman Mohassel, Peter Rindal, Mike Rosulek:
Fast Database Joins and PSI for Secret Shared Data. CCS 2020: 1271-1287 - Antonino Galletta, Maria Fazio, Antonio Celesti, Massimo Villari:
On the Applicability of Secret Share Algorithms for Osmotic Computing. ISCC 2020: 1-6 - Kasper Green Larsen, Mark Simkin:
Secret Sharing Lower Bound: Either Reconstruction is Hard or Shares are Long. SCN 2020: 566-578 - Amos Beimel, Oriol Farràs:
The Share Size of Secret-Sharing Schemes for Almost All Access Structures and Graphs. TCC (3) 2020: 499-529 - Serge Fehr, Chen Yuan:
Robust Secret Sharing with Almost Optimal Share Size and Security Against Rushing Adversaries. TCC (3) 2020: 470-498 - Peeyush Gupta, Yin Li, Sharad Mehrotra, Nisha Panwar, Shantanu Sharma, Sumaya Almanee:
Obscure: Information-Theoretically Secure, Oblivious, and Verifiable Aggregation Queries on Secret-Shared Outsourced Data - Full Version. CoRR abs/2004.13115 (2020) - Amos Beimel, Oriol Farràs:
The Share Size of Secret-Sharing Schemes for Almost All Access Structures and Graphs. IACR Cryptol. ePrint Arch. 2020: 664 (2020) - 2019
- Elochukwu Ukwandu:
RESCUE: evaluation of a fragmented secret share system in distributed-cloud architecture. Edinburgh Napier University, UK, 2019 - Xiaoping Li
, Yanjun Liu
, Hefeng Chen
, Chin-Chen Chang
:
A Secret Image Restoring Scheme Using Threshold Pairs of Unordered Image Shares. IEEE Access 7: 118249-118258 (2019) - Junwei Zhang, Ning Lu, Jianfeng Ma, Chao Yang:
Universally composable secure geographic area verification without pre-shared secret. Sci. China Inf. Sci. 62(3): 32113:1-32113:15 (2019) - Zulfiqar Ali
, Muhammad Imran, Sally I. McClean, Naveed Khan, Muhammad Shoaib
:
Protection of records and data authentication based on secret shares and watermarking. Future Gener. Comput. Syst. 98: 331-341 (2019) - Kouya Tochikubo:
Improvement of General Secret Sharing Scheme Reducing Shares Distributed to Specified Participants. IEICE Trans. Fundam. Electron. Commun. Comput. Sci. 102-A(6): 808-817 (2019) - Yogesh K. Meghrajani
, Laxmi S. Desai, Himanshu S. Mazumdar:
Secure and efficient arithmetic-based multi-secret image sharing scheme using universal share. J. Inf. Secur. Appl. 47: 267-274 (2019) - Guillaume Chèze
:
How to share a cake with a secret agent. Math. Soc. Sci. 100: 13-15 (2019) - Maimoona Al-Ghamdi, Manal Al Ghamdi, Adnan Gutub
:
Security enhancement of shares generation process for multimedia counting-based secret-sharing technique. Multim. Tools Appl. 78(12): 16283-16310 (2019) - Roozbeh Bassirian
, Sadra Boreiri, Vahid Karimipour:
Computing on quantum shared secrets for general quantum access structures. Quantum Inf. Process. 18(4): 109 (2019) - Lin Li
, Chia-Chen Lin
, Chin-Chen Chang:
Using Two Meaningful Shadows to Share Secret Messages with Reversibility. Symmetry 11(1): 79 (2019) - Han-Yu Lin
:
A Pairing-Based Three-Party Authenticated Encryption Scheme without Shared Secrets. Symmetry 11(5): 605 (2019)
skipping 226 more matches
loading more results
failed to load more results, please try again later

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
load content from web.archive.org
Privacy notice: By enabling the option above, your browser will contact the API of web.archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from ,
, and
to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and
to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
Tweets on dblp homepage
Show tweets from on the dblp homepage.
Privacy notice: By enabling the option above, your browser will contact twitter.com and twimg.com to load tweets curated by our Twitter account. At the same time, Twitter will persistently store several cookies with your web browser. While we did signal Twitter to not track our users by setting the "dnt" flag, we do not have any control over how Twitter uses your data. So please proceed with care and consider checking the Twitter privacy policy.
retrieved on 2021-04-12 06:30 CEST from data curated by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint