Advanced search options

Advanced Search Options 🞨

Browse by author name (“Author name starts with…”).

Find ETDs with:

in
/  
in
/  
in
/  
in

Written in Published in Earliest date Latest date

Sorted by

Results per page:

Sorted by: relevance · author · university · dateNew search

You searched for subject:(Secret Sharing). Showing records 1 – 30 of 79 total matches.

[1] [2] [3]

Search Limiters

Last 2 Years | English Only

Levels

Country

▼ Search Limiters


Dalhousie University

1. Gidney, Craig. Rational Secret Sharing with and without Synchronous Broadcast, Conspicuous Secrets, Malicious Players and Unbounded Opponents.

Degree: Master of Computer Science, Faculty of Computer Science, 2012, Dalhousie University

 In secret sharing we are asked to split a secret into several shares in such a way that a minimum number of shares is necessary… (more)

Subjects/Keywords: Rational Secret Sharing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gidney, C. (2012). Rational Secret Sharing with and without Synchronous Broadcast, Conspicuous Secrets, Malicious Players and Unbounded Opponents. (Masters Thesis). Dalhousie University. Retrieved from http://hdl.handle.net/10222/14647

Chicago Manual of Style (16th Edition):

Gidney, Craig. “Rational Secret Sharing with and without Synchronous Broadcast, Conspicuous Secrets, Malicious Players and Unbounded Opponents.” 2012. Masters Thesis, Dalhousie University. Accessed December 03, 2020. http://hdl.handle.net/10222/14647.

MLA Handbook (7th Edition):

Gidney, Craig. “Rational Secret Sharing with and without Synchronous Broadcast, Conspicuous Secrets, Malicious Players and Unbounded Opponents.” 2012. Web. 03 Dec 2020.

Vancouver:

Gidney C. Rational Secret Sharing with and without Synchronous Broadcast, Conspicuous Secrets, Malicious Players and Unbounded Opponents. [Internet] [Masters thesis]. Dalhousie University; 2012. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/10222/14647.

Council of Science Editors:

Gidney C. Rational Secret Sharing with and without Synchronous Broadcast, Conspicuous Secrets, Malicious Players and Unbounded Opponents. [Masters Thesis]. Dalhousie University; 2012. Available from: http://hdl.handle.net/10222/14647


Delft University of Technology

2. Gómez Iñesta, Álvaro (author). Verifiable hybrid secret sharing in the presence of noise.

Degree: 2020, Delft University of Technology

 Verifiable quantum secret sharing (VQSS) is the task of sharing a secret quantum state among the n nodes of a quantum network, in a way… (more)

Subjects/Keywords: Quantum Cryptography; Quantum Error Correction; Quantum Secret Sharing; Secret Sharing; Verifiable Secret Sharing; Trap Code

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Gómez Iñesta, . (. (2020). Verifiable hybrid secret sharing in the presence of noise. (Masters Thesis). Delft University of Technology. Retrieved from http://resolver.tudelft.nl/uuid:6b7c6ac9-653f-4bcc-b6ad-4e4476ace765

Chicago Manual of Style (16th Edition):

Gómez Iñesta, Álvaro (author). “Verifiable hybrid secret sharing in the presence of noise.” 2020. Masters Thesis, Delft University of Technology. Accessed December 03, 2020. http://resolver.tudelft.nl/uuid:6b7c6ac9-653f-4bcc-b6ad-4e4476ace765.

MLA Handbook (7th Edition):

Gómez Iñesta, Álvaro (author). “Verifiable hybrid secret sharing in the presence of noise.” 2020. Web. 03 Dec 2020.

Vancouver:

Gómez Iñesta (. Verifiable hybrid secret sharing in the presence of noise. [Internet] [Masters thesis]. Delft University of Technology; 2020. [cited 2020 Dec 03]. Available from: http://resolver.tudelft.nl/uuid:6b7c6ac9-653f-4bcc-b6ad-4e4476ace765.

Council of Science Editors:

Gómez Iñesta (. Verifiable hybrid secret sharing in the presence of noise. [Masters Thesis]. Delft University of Technology; 2020. Available from: http://resolver.tudelft.nl/uuid:6b7c6ac9-653f-4bcc-b6ad-4e4476ace765


Universidade do Minho

3. Pinto, Mário Jorge Barros. Computação segura de SQL .

Degree: 2014, Universidade do Minho

 Due to the emerging of cloud-based services, people have been, gradually, changing the way they store their data. The possibility to store data on a… (more)

Subjects/Keywords: SQL; Secret Sharing; SMPC; NoSQL

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pinto, M. J. B. (2014). Computação segura de SQL . (Masters Thesis). Universidade do Minho. Retrieved from http://hdl.handle.net/1822/36852

Chicago Manual of Style (16th Edition):

Pinto, Mário Jorge Barros. “Computação segura de SQL .” 2014. Masters Thesis, Universidade do Minho. Accessed December 03, 2020. http://hdl.handle.net/1822/36852.

MLA Handbook (7th Edition):

Pinto, Mário Jorge Barros. “Computação segura de SQL .” 2014. Web. 03 Dec 2020.

Vancouver:

Pinto MJB. Computação segura de SQL . [Internet] [Masters thesis]. Universidade do Minho; 2014. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/1822/36852.

Council of Science Editors:

Pinto MJB. Computação segura de SQL . [Masters Thesis]. Universidade do Minho; 2014. Available from: http://hdl.handle.net/1822/36852

4. Belenkiy, Mira. Sharing Secrets for Fun and Profit.

Degree: PhD, Computer Science, 2008, Brown University

 Electronic cash is an important tool for preserving on-line privacy. It allows a user to make purchases without revealing his identity to the merchant and… (more)

Subjects/Keywords: secret sharing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Belenkiy, M. (2008). Sharing Secrets for Fun and Profit. (Doctoral Dissertation). Brown University. Retrieved from https://repository.library.brown.edu/studio/item/bdr:298/

Chicago Manual of Style (16th Edition):

Belenkiy, Mira. “Sharing Secrets for Fun and Profit.” 2008. Doctoral Dissertation, Brown University. Accessed December 03, 2020. https://repository.library.brown.edu/studio/item/bdr:298/.

MLA Handbook (7th Edition):

Belenkiy, Mira. “Sharing Secrets for Fun and Profit.” 2008. Web. 03 Dec 2020.

Vancouver:

Belenkiy M. Sharing Secrets for Fun and Profit. [Internet] [Doctoral dissertation]. Brown University; 2008. [cited 2020 Dec 03]. Available from: https://repository.library.brown.edu/studio/item/bdr:298/.

Council of Science Editors:

Belenkiy M. Sharing Secrets for Fun and Profit. [Doctoral Dissertation]. Brown University; 2008. Available from: https://repository.library.brown.edu/studio/item/bdr:298/


Victoria University of Wellington

5. Welsh, Michael. Golden-Mean and Secret Sharing Matroids.

Degree: 2011, Victoria University of Wellington

 Maximum-sized results are an important part of matroid theory, and results currently exist for various classes of matroids. Archer conjectured that the maximum-sized golden-mean matroids… (more)

Subjects/Keywords: Matroid theory; Secret sharing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Welsh, M. (2011). Golden-Mean and Secret Sharing Matroids. (Masters Thesis). Victoria University of Wellington. Retrieved from http://hdl.handle.net/10063/1683

Chicago Manual of Style (16th Edition):

Welsh, Michael. “Golden-Mean and Secret Sharing Matroids.” 2011. Masters Thesis, Victoria University of Wellington. Accessed December 03, 2020. http://hdl.handle.net/10063/1683.

MLA Handbook (7th Edition):

Welsh, Michael. “Golden-Mean and Secret Sharing Matroids.” 2011. Web. 03 Dec 2020.

Vancouver:

Welsh M. Golden-Mean and Secret Sharing Matroids. [Internet] [Masters thesis]. Victoria University of Wellington; 2011. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/10063/1683.

Council of Science Editors:

Welsh M. Golden-Mean and Secret Sharing Matroids. [Masters Thesis]. Victoria University of Wellington; 2011. Available from: http://hdl.handle.net/10063/1683


University of New Orleans

6. Miceli, Christopher. One Time Password Scheme Via Secret Sharing Techniques.

Degree: MS, Computer Science, 2011, University of New Orleans

 Many organizations today are seeking to improve security by implementing multi-factor authentication, i.e. authentication requiring more than one independent mechanism to prove one's identity. One-time… (more)

Subjects/Keywords: Shamir secret sharing; Proactive secret sharing; Verifiable secret sharing; one-time password; multi-factor authentication; password

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Miceli, C. (2011). One Time Password Scheme Via Secret Sharing Techniques. (Thesis). University of New Orleans. Retrieved from https://scholarworks.uno.edu/td/1330

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Miceli, Christopher. “One Time Password Scheme Via Secret Sharing Techniques.” 2011. Thesis, University of New Orleans. Accessed December 03, 2020. https://scholarworks.uno.edu/td/1330.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Miceli, Christopher. “One Time Password Scheme Via Secret Sharing Techniques.” 2011. Web. 03 Dec 2020.

Vancouver:

Miceli C. One Time Password Scheme Via Secret Sharing Techniques. [Internet] [Thesis]. University of New Orleans; 2011. [cited 2020 Dec 03]. Available from: https://scholarworks.uno.edu/td/1330.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Miceli C. One Time Password Scheme Via Secret Sharing Techniques. [Thesis]. University of New Orleans; 2011. Available from: https://scholarworks.uno.edu/td/1330

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Toronto

7. Munster, Javier. Securing Publish/Subscribe.

Degree: 2018, University of Toronto

Increased public scrutiny has led to calls for greater security regarding user data. As a widely used many-to-many communication paradigm, publish/subscribe (pub/sub) has received a… (more)

Subjects/Keywords: Confidnetiality; Publish/Subscribe; Secret sharing; Security; 0464

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Munster, J. (2018). Securing Publish/Subscribe. (Masters Thesis). University of Toronto. Retrieved from http://hdl.handle.net/1807/91640

Chicago Manual of Style (16th Edition):

Munster, Javier. “Securing Publish/Subscribe.” 2018. Masters Thesis, University of Toronto. Accessed December 03, 2020. http://hdl.handle.net/1807/91640.

MLA Handbook (7th Edition):

Munster, Javier. “Securing Publish/Subscribe.” 2018. Web. 03 Dec 2020.

Vancouver:

Munster J. Securing Publish/Subscribe. [Internet] [Masters thesis]. University of Toronto; 2018. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/1807/91640.

Council of Science Editors:

Munster J. Securing Publish/Subscribe. [Masters Thesis]. University of Toronto; 2018. Available from: http://hdl.handle.net/1807/91640


University of Toronto

8. Munster, Javier. Securing Publish/Subscribe.

Degree: 2018, University of Toronto

Increased public scrutiny has led to calls for greater security regarding user data. As a widely used many-to-many communication paradigm, publish/subscribe (pub/sub) has received a… (more)

Subjects/Keywords: Confidnetiality; Publish/Subscribe; Secret sharing; Security; 0464

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Munster, J. (2018). Securing Publish/Subscribe. (Masters Thesis). University of Toronto. Retrieved from http://hdl.handle.net/1807/92175

Chicago Manual of Style (16th Edition):

Munster, Javier. “Securing Publish/Subscribe.” 2018. Masters Thesis, University of Toronto. Accessed December 03, 2020. http://hdl.handle.net/1807/92175.

MLA Handbook (7th Edition):

Munster, Javier. “Securing Publish/Subscribe.” 2018. Web. 03 Dec 2020.

Vancouver:

Munster J. Securing Publish/Subscribe. [Internet] [Masters thesis]. University of Toronto; 2018. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/1807/92175.

Council of Science Editors:

Munster J. Securing Publish/Subscribe. [Masters Thesis]. University of Toronto; 2018. Available from: http://hdl.handle.net/1807/92175


Université Montpellier II

9. Kaced, Tarik. Partage de secret et théorie algorithmique de l'information : Secret Sharing and Algorithmic Information Theory.

Degree: Docteur es, Informatique, 2012, Université Montpellier II

Notre travail sur le partage de secret se base sur les points de vue théoriques de la Théorie de l'Information de Shannon et de la… (more)

Subjects/Keywords: Partage de Secret; Théorie de l'Information; Complexité de Kolmogorov; Secret Sharing; Information Theory; Kolmogorov Complexity

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Kaced, T. (2012). Partage de secret et théorie algorithmique de l'information : Secret Sharing and Algorithmic Information Theory. (Doctoral Dissertation). Université Montpellier II. Retrieved from http://www.theses.fr/2012MON20170

Chicago Manual of Style (16th Edition):

Kaced, Tarik. “Partage de secret et théorie algorithmique de l'information : Secret Sharing and Algorithmic Information Theory.” 2012. Doctoral Dissertation, Université Montpellier II. Accessed December 03, 2020. http://www.theses.fr/2012MON20170.

MLA Handbook (7th Edition):

Kaced, Tarik. “Partage de secret et théorie algorithmique de l'information : Secret Sharing and Algorithmic Information Theory.” 2012. Web. 03 Dec 2020.

Vancouver:

Kaced T. Partage de secret et théorie algorithmique de l'information : Secret Sharing and Algorithmic Information Theory. [Internet] [Doctoral dissertation]. Université Montpellier II; 2012. [cited 2020 Dec 03]. Available from: http://www.theses.fr/2012MON20170.

Council of Science Editors:

Kaced T. Partage de secret et théorie algorithmique de l'information : Secret Sharing and Algorithmic Information Theory. [Doctoral Dissertation]. Université Montpellier II; 2012. Available from: http://www.theses.fr/2012MON20170


Royal Holloway, University of London

10. Laing, Thalia. Enhanced threshold schemes and their applications.

Degree: PhD, 2018, Royal Holloway, University of London

 Techniques that distribute data across multiple players in such a way that a threshold number of players can reconstruct the data, whilst any fewer than… (more)

Subjects/Keywords: threshold schemes; secret sharing; security; perfect security; computational security; repairable threshold schemes; localised multi-secret sharing schemes; combinatorics; applications; lightweight devices

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Laing, T. (2018). Enhanced threshold schemes and their applications. (Doctoral Dissertation). Royal Holloway, University of London. Retrieved from https://pure.royalholloway.ac.uk/portal/en/publications/enhanced-threshold-schemes-and-their-applications(3991745a-883c-44f9-9edc-369938477b42).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792782

Chicago Manual of Style (16th Edition):

Laing, Thalia. “Enhanced threshold schemes and their applications.” 2018. Doctoral Dissertation, Royal Holloway, University of London. Accessed December 03, 2020. https://pure.royalholloway.ac.uk/portal/en/publications/enhanced-threshold-schemes-and-their-applications(3991745a-883c-44f9-9edc-369938477b42).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792782.

MLA Handbook (7th Edition):

Laing, Thalia. “Enhanced threshold schemes and their applications.” 2018. Web. 03 Dec 2020.

Vancouver:

Laing T. Enhanced threshold schemes and their applications. [Internet] [Doctoral dissertation]. Royal Holloway, University of London; 2018. [cited 2020 Dec 03]. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/enhanced-threshold-schemes-and-their-applications(3991745a-883c-44f9-9edc-369938477b42).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792782.

Council of Science Editors:

Laing T. Enhanced threshold schemes and their applications. [Doctoral Dissertation]. Royal Holloway, University of London; 2018. Available from: https://pure.royalholloway.ac.uk/portal/en/publications/enhanced-threshold-schemes-and-their-applications(3991745a-883c-44f9-9edc-369938477b42).html ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.792782


Oklahoma State University

11. Katta, Sandeep. Secret Sharing in Visual Cryptography.

Degree: Computer Science Department, 2011, Oklahoma State University

 This thesis examines techniques for recursive hiding scheme for 3 out of 5 secret sharing and a probabilistic 2 out of 3 secret sharing scheme… (more)

Subjects/Keywords: 3 out of 5 secret sharing; gray scale cryptography; information efficiency; recursive hiding of secrets; secret sharing; visual cryptography

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Katta, S. (2011). Secret Sharing in Visual Cryptography. (Thesis). Oklahoma State University. Retrieved from http://hdl.handle.net/11244/8178

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Katta, Sandeep. “Secret Sharing in Visual Cryptography.” 2011. Thesis, Oklahoma State University. Accessed December 03, 2020. http://hdl.handle.net/11244/8178.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Katta, Sandeep. “Secret Sharing in Visual Cryptography.” 2011. Web. 03 Dec 2020.

Vancouver:

Katta S. Secret Sharing in Visual Cryptography. [Internet] [Thesis]. Oklahoma State University; 2011. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/11244/8178.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Katta S. Secret Sharing in Visual Cryptography. [Thesis]. Oklahoma State University; 2011. Available from: http://hdl.handle.net/11244/8178

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Vilnius University

12. Valkaitis, Mindaugas. Efektyvios šifravimo bei skaitmeninio parašo sistemos.

Degree: Master, 2014, Vilnius University

Šio darbo tikslas – apžvelgti šiuo metu naudojamas klasikines viešojo rakto šifravimo ir skaitmeninio parašo sistemas bei naujos kartos Signcryption kriptosistemą ir atlikti dedikuotos pasirašymo… (more)

Subjects/Keywords: Public Key Cryptography; Digital Signature; RSA; ElGamal; Signcryption; Secret Sharing; (k; N) Threshold Sharing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Valkaitis, Mindaugas. (2014). Efektyvios šifravimo bei skaitmeninio parašo sistemos. (Masters Thesis). Vilnius University. Retrieved from http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20140704_171717-30545 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Chicago Manual of Style (16th Edition):

Valkaitis, Mindaugas. “Efektyvios šifravimo bei skaitmeninio parašo sistemos.” 2014. Masters Thesis, Vilnius University. Accessed December 03, 2020. http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20140704_171717-30545 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

MLA Handbook (7th Edition):

Valkaitis, Mindaugas. “Efektyvios šifravimo bei skaitmeninio parašo sistemos.” 2014. Web. 03 Dec 2020.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Vancouver:

Valkaitis, Mindaugas. Efektyvios šifravimo bei skaitmeninio parašo sistemos. [Internet] [Masters thesis]. Vilnius University; 2014. [cited 2020 Dec 03]. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20140704_171717-30545 ;.

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete

Council of Science Editors:

Valkaitis, Mindaugas. Efektyvios šifravimo bei skaitmeninio parašo sistemos. [Masters Thesis]. Vilnius University; 2014. Available from: http://vddb.laba.lt/obj/LT-eLABa-0001:E.02~2012~D_20140704_171717-30545 ;

Note: this citation may be lacking information needed for this citation format:
Author name may be incomplete


Universidade de Lisboa

13. André, Fernando Martins. Availability and confidentiality in storage clouds.

Degree: 2010, Universidade de Lisboa

 Cloud Computing and Cloud Storage in particular are rapidly transforming the nature of how business use information technology based on a software-as-a-service model. The main… (more)

Subjects/Keywords: erasure codes; secret sharing; confidentiality; depsky; cloud storage, availability

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

André, F. M. (2010). Availability and confidentiality in storage clouds. (Thesis). Universidade de Lisboa. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13907

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

André, Fernando Martins. “Availability and confidentiality in storage clouds.” 2010. Thesis, Universidade de Lisboa. Accessed December 03, 2020. http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13907.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

André, Fernando Martins. “Availability and confidentiality in storage clouds.” 2010. Web. 03 Dec 2020.

Vancouver:

André FM. Availability and confidentiality in storage clouds. [Internet] [Thesis]. Universidade de Lisboa; 2010. [cited 2020 Dec 03]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13907.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

André FM. Availability and confidentiality in storage clouds. [Thesis]. Universidade de Lisboa; 2010. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/13907

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

14. Wang , Jian-Sheng. Flexible Authentication Protocol with Key Reconstruction in WBAN Environment.

Degree: Master, Computer Science and Engineering, 2016, NSYSU

 Wireless body area network (WBAN) plays an important part in mobile healthcare. WBAN can be imagined as a small wireless local area network around our… (more)

Subjects/Keywords: Key reconstruction; Authentication; Wireless body area network; Homomorphic secret sharing; Healthcare

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wang , J. (2016). Flexible Authentication Protocol with Key Reconstruction in WBAN Environment. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621116-153846

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Wang , Jian-Sheng. “Flexible Authentication Protocol with Key Reconstruction in WBAN Environment.” 2016. Thesis, NSYSU. Accessed December 03, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621116-153846.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Wang , Jian-Sheng. “Flexible Authentication Protocol with Key Reconstruction in WBAN Environment.” 2016. Web. 03 Dec 2020.

Vancouver:

Wang J. Flexible Authentication Protocol with Key Reconstruction in WBAN Environment. [Internet] [Thesis]. NSYSU; 2016. [cited 2020 Dec 03]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621116-153846.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Wang J. Flexible Authentication Protocol with Key Reconstruction in WBAN Environment. [Thesis]. NSYSU; 2016. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0621116-153846

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

15. 趙, 凱. Anti-Phishing Mutual Authentication Using the Visual Secret Sharing Scheme.

Degree: Nara Institute of Science and Technology / 奈良先端科学技術大学院大学

Subjects/Keywords: visual secret sharing scheme

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

趙, . (n.d.). Anti-Phishing Mutual Authentication Using the Visual Secret Sharing Scheme. (Thesis). Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Retrieved from http://hdl.handle.net/10061/6630

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

趙, 凱. “Anti-Phishing Mutual Authentication Using the Visual Secret Sharing Scheme.” Thesis, Nara Institute of Science and Technology / 奈良先端科学技術大学院大学. Accessed December 03, 2020. http://hdl.handle.net/10061/6630.

Note: this citation may be lacking information needed for this citation format:
No year of publication.
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

趙, 凱. “Anti-Phishing Mutual Authentication Using the Visual Secret Sharing Scheme.” Web. 03 Dec 2020.

Note: this citation may be lacking information needed for this citation format:
No year of publication.

Vancouver:

趙 . Anti-Phishing Mutual Authentication Using the Visual Secret Sharing Scheme. [Internet] [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; [cited 2020 Dec 03]. Available from: http://hdl.handle.net/10061/6630.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

Council of Science Editors:

趙 . Anti-Phishing Mutual Authentication Using the Visual Secret Sharing Scheme. [Thesis]. Nara Institute of Science and Technology / 奈良先端科学技術大学院大学; Available from: http://hdl.handle.net/10061/6630

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation
No year of publication.

16. Manju, C. Algebraic Geometric Codes and their relation to Cryptography using Elliptic Curves.

Degree: 2010, Cochin University of Science and Technology

Communication is the process of transmitting data across channel. Whenever data is transmitted across a channel, errors are likely to occur. Coding theory is a… (more)

Subjects/Keywords: Algebraic Geometric Codes; Public Key cryptography; Secret sharing,; Cryptographic algorithm,; Implementation.

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Manju, C. (2010). Algebraic Geometric Codes and their relation to Cryptography using Elliptic Curves. (Thesis). Cochin University of Science and Technology. Retrieved from http://dyuthi.cusat.ac.in/purl/3702

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Manju, C. “Algebraic Geometric Codes and their relation to Cryptography using Elliptic Curves.” 2010. Thesis, Cochin University of Science and Technology. Accessed December 03, 2020. http://dyuthi.cusat.ac.in/purl/3702.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Manju, C. “Algebraic Geometric Codes and their relation to Cryptography using Elliptic Curves.” 2010. Web. 03 Dec 2020.

Vancouver:

Manju C. Algebraic Geometric Codes and their relation to Cryptography using Elliptic Curves. [Internet] [Thesis]. Cochin University of Science and Technology; 2010. [cited 2020 Dec 03]. Available from: http://dyuthi.cusat.ac.in/purl/3702.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Manju C. Algebraic Geometric Codes and their relation to Cryptography using Elliptic Curves. [Thesis]. Cochin University of Science and Technology; 2010. Available from: http://dyuthi.cusat.ac.in/purl/3702

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

17. Chung, I-Chia. An Efficient Fault-tolerant Cloud Storage Scheme Based on Secret Sharing.

Degree: Master, Computer Science and Engineering, 2017, NSYSU

 An efficient and fault-tolerant cloud storage scheme for file owners is presented in this paper. A large file is first divided into secrets, and each… (more)

Subjects/Keywords: secret sharing; cloud storage; cloud security; XOR; cloud computing

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Chung, I. (2017). An Efficient Fault-tolerant Cloud Storage Scheme Based on Secret Sharing. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0620117-132009

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Chung, I-Chia. “An Efficient Fault-tolerant Cloud Storage Scheme Based on Secret Sharing.” 2017. Thesis, NSYSU. Accessed December 03, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0620117-132009.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Chung, I-Chia. “An Efficient Fault-tolerant Cloud Storage Scheme Based on Secret Sharing.” 2017. Web. 03 Dec 2020.

Vancouver:

Chung I. An Efficient Fault-tolerant Cloud Storage Scheme Based on Secret Sharing. [Internet] [Thesis]. NSYSU; 2017. [cited 2020 Dec 03]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0620117-132009.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Chung I. An Efficient Fault-tolerant Cloud Storage Scheme Based on Secret Sharing. [Thesis]. NSYSU; 2017. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0620117-132009

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Rochester Institute of Technology

18. Lipton, Benjamin. Smart Grid Privacy through Distributed Trust.

Degree: MS, Department of Computing Security (GCCIS), 2017, Rochester Institute of Technology

  Though the smart electrical grid promises many advantages in efficiency and reliability, the risks to consumer privacy have impeded its deployment. Researchers have proposed… (more)

Subjects/Keywords: Homomorphic encryption; Privacy; Secret sharing; Smart grid; Smart meter

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lipton, B. (2017). Smart Grid Privacy through Distributed Trust. (Masters Thesis). Rochester Institute of Technology. Retrieved from https://scholarworks.rit.edu/theses/9496

Chicago Manual of Style (16th Edition):

Lipton, Benjamin. “Smart Grid Privacy through Distributed Trust.” 2017. Masters Thesis, Rochester Institute of Technology. Accessed December 03, 2020. https://scholarworks.rit.edu/theses/9496.

MLA Handbook (7th Edition):

Lipton, Benjamin. “Smart Grid Privacy through Distributed Trust.” 2017. Web. 03 Dec 2020.

Vancouver:

Lipton B. Smart Grid Privacy through Distributed Trust. [Internet] [Masters thesis]. Rochester Institute of Technology; 2017. [cited 2020 Dec 03]. Available from: https://scholarworks.rit.edu/theses/9496.

Council of Science Editors:

Lipton B. Smart Grid Privacy through Distributed Trust. [Masters Thesis]. Rochester Institute of Technology; 2017. Available from: https://scholarworks.rit.edu/theses/9496


University of Bristol

19. Wood, Tim N. Reducing communication costs in multi-party computation.

Degree: PhD, 2019, University of Bristol

 Multi-party computation (MPC) is a way of computing on private data without revealing the data itself. To do this, data is "secret-shared" amongst a set… (more)

Subjects/Keywords: 004; cryptography; secret-sharing; mpc; garbled circuits; preprocessing model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wood, T. N. (2019). Reducing communication costs in multi-party computation. (Doctoral Dissertation). University of Bristol. Retrieved from http://hdl.handle.net/1983/e9b643eb-70b6-44c5-9713-256b30caf1ef

Chicago Manual of Style (16th Edition):

Wood, Tim N. “Reducing communication costs in multi-party computation.” 2019. Doctoral Dissertation, University of Bristol. Accessed December 03, 2020. http://hdl.handle.net/1983/e9b643eb-70b6-44c5-9713-256b30caf1ef.

MLA Handbook (7th Edition):

Wood, Tim N. “Reducing communication costs in multi-party computation.” 2019. Web. 03 Dec 2020.

Vancouver:

Wood TN. Reducing communication costs in multi-party computation. [Internet] [Doctoral dissertation]. University of Bristol; 2019. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/1983/e9b643eb-70b6-44c5-9713-256b30caf1ef.

Council of Science Editors:

Wood TN. Reducing communication costs in multi-party computation. [Doctoral Dissertation]. University of Bristol; 2019. Available from: http://hdl.handle.net/1983/e9b643eb-70b6-44c5-9713-256b30caf1ef


University of Bristol

20. Wood, Tim N. Reducing communication costs in multi-party computation.

Degree: PhD, 2019, University of Bristol

 Multi-party computation (MPC) is a way of computing on private data without revealing the data itself. To do this, data is "secret-shared" amongst a set… (more)

Subjects/Keywords: 004; cryptography; secret-sharing; mpc; garbled circuits; preprocessing model

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Wood, T. N. (2019). Reducing communication costs in multi-party computation. (Doctoral Dissertation). University of Bristol. Retrieved from https://research-information.bris.ac.uk/en/studentTheses/e9b643eb-70b6-44c5-9713-256b30caf1ef ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.794505

Chicago Manual of Style (16th Edition):

Wood, Tim N. “Reducing communication costs in multi-party computation.” 2019. Doctoral Dissertation, University of Bristol. Accessed December 03, 2020. https://research-information.bris.ac.uk/en/studentTheses/e9b643eb-70b6-44c5-9713-256b30caf1ef ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.794505.

MLA Handbook (7th Edition):

Wood, Tim N. “Reducing communication costs in multi-party computation.” 2019. Web. 03 Dec 2020.

Vancouver:

Wood TN. Reducing communication costs in multi-party computation. [Internet] [Doctoral dissertation]. University of Bristol; 2019. [cited 2020 Dec 03]. Available from: https://research-information.bris.ac.uk/en/studentTheses/e9b643eb-70b6-44c5-9713-256b30caf1ef ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.794505.

Council of Science Editors:

Wood TN. Reducing communication costs in multi-party computation. [Doctoral Dissertation]. University of Bristol; 2019. Available from: https://research-information.bris.ac.uk/en/studentTheses/e9b643eb-70b6-44c5-9713-256b30caf1ef ; https://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.794505


Penn State University

21. Vijayakumar, Dharani Sankar. Implementation and Evaluation of a storage system for long term data .

Degree: 2008, Penn State University

 Many factors such as legislations, family heritage necessitates data such as medical records, legal documents to be secured and preserved for a longer period of… (more)

Subjects/Keywords: Data Availability; Secret Sharing; Archival Data; Secret Redistribution

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Vijayakumar, D. S. (2008). Implementation and Evaluation of a storage system for long term data . (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/9155

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Vijayakumar, Dharani Sankar. “Implementation and Evaluation of a storage system for long term data .” 2008. Thesis, Penn State University. Accessed December 03, 2020. https://submit-etda.libraries.psu.edu/catalog/9155.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Vijayakumar, Dharani Sankar. “Implementation and Evaluation of a storage system for long term data .” 2008. Web. 03 Dec 2020.

Vancouver:

Vijayakumar DS. Implementation and Evaluation of a storage system for long term data . [Internet] [Thesis]. Penn State University; 2008. [cited 2020 Dec 03]. Available from: https://submit-etda.libraries.psu.edu/catalog/9155.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Vijayakumar DS. Implementation and Evaluation of a storage system for long term data . [Thesis]. Penn State University; 2008. Available from: https://submit-etda.libraries.psu.edu/catalog/9155

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

22. Renner, Soline. Protection des algorithmes cryptographiques embarqués : Cryptographic Protection in Embedded Systems.

Degree: Docteur es, Mathématiques pures, 2014, Bordeaux

Depuis la fin des années 90, les cryptosystèmes implantés sur carte à puce doivent faire face à deux grandes catégories d'attaques : les attaques par… (more)

Subjects/Keywords: Attaques par canaux cachés; Schémas de partage de secret; Codes linéaires; Side-channel attacks; Secret sharing schemes; Linear codes

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Renner, S. (2014). Protection des algorithmes cryptographiques embarqués : Cryptographic Protection in Embedded Systems. (Doctoral Dissertation). Bordeaux. Retrieved from http://www.theses.fr/2014BORD0057

Chicago Manual of Style (16th Edition):

Renner, Soline. “Protection des algorithmes cryptographiques embarqués : Cryptographic Protection in Embedded Systems.” 2014. Doctoral Dissertation, Bordeaux. Accessed December 03, 2020. http://www.theses.fr/2014BORD0057.

MLA Handbook (7th Edition):

Renner, Soline. “Protection des algorithmes cryptographiques embarqués : Cryptographic Protection in Embedded Systems.” 2014. Web. 03 Dec 2020.

Vancouver:

Renner S. Protection des algorithmes cryptographiques embarqués : Cryptographic Protection in Embedded Systems. [Internet] [Doctoral dissertation]. Bordeaux; 2014. [cited 2020 Dec 03]. Available from: http://www.theses.fr/2014BORD0057.

Council of Science Editors:

Renner S. Protection des algorithmes cryptographiques embarqués : Cryptographic Protection in Embedded Systems. [Doctoral Dissertation]. Bordeaux; 2014. Available from: http://www.theses.fr/2014BORD0057

23. Beugnon, Sébastien. Sécurisation des maillages 3D pour l'industrie de la chaussure et la maroquinerie : Securing 3D meshes for shoes and leather industry.

Degree: Docteur es, Informatique, 2019, Montpellier

 Avec l'augmentation des échanges de données et les évolutions technologiques et sociales récentes, les contenus multimédias prennent une place importante dans le trafic mondial. Aujourd'hui,… (more)

Subjects/Keywords: Objet 3D; Chiffrement sélectif; Partage de secret; Analyse 3D; Sécurité multimédia; 3D Object; Selective encryption; Secret sharing; 3D Analysis; Multimedia security

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Beugnon, S. (2019). Sécurisation des maillages 3D pour l'industrie de la chaussure et la maroquinerie : Securing 3D meshes for shoes and leather industry. (Doctoral Dissertation). Montpellier. Retrieved from http://www.theses.fr/2019MONTS097

Chicago Manual of Style (16th Edition):

Beugnon, Sébastien. “Sécurisation des maillages 3D pour l'industrie de la chaussure et la maroquinerie : Securing 3D meshes for shoes and leather industry.” 2019. Doctoral Dissertation, Montpellier. Accessed December 03, 2020. http://www.theses.fr/2019MONTS097.

MLA Handbook (7th Edition):

Beugnon, Sébastien. “Sécurisation des maillages 3D pour l'industrie de la chaussure et la maroquinerie : Securing 3D meshes for shoes and leather industry.” 2019. Web. 03 Dec 2020.

Vancouver:

Beugnon S. Sécurisation des maillages 3D pour l'industrie de la chaussure et la maroquinerie : Securing 3D meshes for shoes and leather industry. [Internet] [Doctoral dissertation]. Montpellier; 2019. [cited 2020 Dec 03]. Available from: http://www.theses.fr/2019MONTS097.

Council of Science Editors:

Beugnon S. Sécurisation des maillages 3D pour l'industrie de la chaussure et la maroquinerie : Securing 3D meshes for shoes and leather industry. [Doctoral Dissertation]. Montpellier; 2019. Available from: http://www.theses.fr/2019MONTS097

24. Sreekumar, A. Secret Sharing Schemes Using Visual Cryptography.

Degree: Computer Applications, 2009, Cochin University of Science and Technology

Secret sharing schemes allow a secret to be shared among a group of participants so that only qualified subsets of participants can recover the secret.… (more)

Subjects/Keywords: Visual Cryptography; Shamir Secret Sharing Scheme; Ito-Saito-Nishizeki Scheme; Benaloh-Leichter Scheme; Balanced Strings; Permutation Ordered Binary Number System; Cryptography; Secret sharing; Randomness

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Sreekumar, A. (2009). Secret Sharing Schemes Using Visual Cryptography. (Thesis). Cochin University of Science and Technology. Retrieved from http://dyuthi.cusat.ac.in/purl/1952

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Sreekumar, A. “Secret Sharing Schemes Using Visual Cryptography.” 2009. Thesis, Cochin University of Science and Technology. Accessed December 03, 2020. http://dyuthi.cusat.ac.in/purl/1952.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Sreekumar, A. “Secret Sharing Schemes Using Visual Cryptography.” 2009. Web. 03 Dec 2020.

Vancouver:

Sreekumar A. Secret Sharing Schemes Using Visual Cryptography. [Internet] [Thesis]. Cochin University of Science and Technology; 2009. [cited 2020 Dec 03]. Available from: http://dyuthi.cusat.ac.in/purl/1952.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Sreekumar A. Secret Sharing Schemes Using Visual Cryptography. [Thesis]. Cochin University of Science and Technology; 2009. Available from: http://dyuthi.cusat.ac.in/purl/1952

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

25. Smith, Guillaume. Concevoir des applications temps-réel respectant la vie privée en exploitant les liens entre codes à effacements et les mécanismes de partages de secrets : Enabling private real-time applications by exploiting the links between erasure coding and secret sharing mechanisms.

Degree: Docteur es, Réseaux, Télécoms, Systèmes et Architecture, 2014, Toulouse, ISAE

Une large quantité de données personnelles sont partagées en temps réel par des utilisateurs en ligne, utilisant de plus en plus des terminaux mobiles avec… (more)

Subjects/Keywords: Code à effacement; Secret sharing; Calcul distribué et sécurisé; Calcul distribué; Application temps réel; Erasure code; Secret sharing; Secure multi-Party computation; Distributed computing; Real-Time application; 000

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Smith, G. (2014). Concevoir des applications temps-réel respectant la vie privée en exploitant les liens entre codes à effacements et les mécanismes de partages de secrets : Enabling private real-time applications by exploiting the links between erasure coding and secret sharing mechanisms. (Doctoral Dissertation). Toulouse, ISAE. Retrieved from http://www.theses.fr/2014ESAE0045

Chicago Manual of Style (16th Edition):

Smith, Guillaume. “Concevoir des applications temps-réel respectant la vie privée en exploitant les liens entre codes à effacements et les mécanismes de partages de secrets : Enabling private real-time applications by exploiting the links between erasure coding and secret sharing mechanisms.” 2014. Doctoral Dissertation, Toulouse, ISAE. Accessed December 03, 2020. http://www.theses.fr/2014ESAE0045.

MLA Handbook (7th Edition):

Smith, Guillaume. “Concevoir des applications temps-réel respectant la vie privée en exploitant les liens entre codes à effacements et les mécanismes de partages de secrets : Enabling private real-time applications by exploiting the links between erasure coding and secret sharing mechanisms.” 2014. Web. 03 Dec 2020.

Vancouver:

Smith G. Concevoir des applications temps-réel respectant la vie privée en exploitant les liens entre codes à effacements et les mécanismes de partages de secrets : Enabling private real-time applications by exploiting the links between erasure coding and secret sharing mechanisms. [Internet] [Doctoral dissertation]. Toulouse, ISAE; 2014. [cited 2020 Dec 03]. Available from: http://www.theses.fr/2014ESAE0045.

Council of Science Editors:

Smith G. Concevoir des applications temps-réel respectant la vie privée en exploitant les liens entre codes à effacements et les mécanismes de partages de secrets : Enabling private real-time applications by exploiting the links between erasure coding and secret sharing mechanisms. [Doctoral Dissertation]. Toulouse, ISAE; 2014. Available from: http://www.theses.fr/2014ESAE0045


NSYSU

26. Lin, Cheng-Ting. A Secret-Sharing-Based Method for Cloud Storage System.

Degree: Master, Computer Science and Engineering, 2015, NSYSU

 In recent years, at an era of information explosion, cloud storage system is wide-spread used in our daily life. However, cloud storage system include many… (more)

Subjects/Keywords: exclusive-or operation; random number; cloud computing system; secret sharing; cloud storage system

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Lin, C. (2015). A Secret-Sharing-Based Method for Cloud Storage System. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0802115-161902

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Lin, Cheng-Ting. “A Secret-Sharing-Based Method for Cloud Storage System.” 2015. Thesis, NSYSU. Accessed December 03, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0802115-161902.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Lin, Cheng-Ting. “A Secret-Sharing-Based Method for Cloud Storage System.” 2015. Web. 03 Dec 2020.

Vancouver:

Lin C. A Secret-Sharing-Based Method for Cloud Storage System. [Internet] [Thesis]. NSYSU; 2015. [cited 2020 Dec 03]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0802115-161902.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Lin C. A Secret-Sharing-Based Method for Cloud Storage System. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0802115-161902

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


NSYSU

27. Feng, Cheng-Chun. Efficient Attribute-Based Encryption with Dynamic Membership.

Degree: Master, Computer Science and Engineering, 2015, NSYSU

 Attribute-based encryption (ABE) is an access control mechanism where a sender can encrypt a secret message according to an attribute set for multiple receivers. In… (more)

Subjects/Keywords: Bilinear pairing; Ciphertext-policy attribute-based encryption; Access control; Linear secret sharing scheme; Dynamic membership

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Feng, C. (2015). Efficient Attribute-Based Encryption with Dynamic Membership. (Thesis). NSYSU. Retrieved from http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712115-101414

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Feng, Cheng-Chun. “Efficient Attribute-Based Encryption with Dynamic Membership.” 2015. Thesis, NSYSU. Accessed December 03, 2020. http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712115-101414.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Feng, Cheng-Chun. “Efficient Attribute-Based Encryption with Dynamic Membership.” 2015. Web. 03 Dec 2020.

Vancouver:

Feng C. Efficient Attribute-Based Encryption with Dynamic Membership. [Internet] [Thesis]. NSYSU; 2015. [cited 2020 Dec 03]. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712115-101414.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Feng C. Efficient Attribute-Based Encryption with Dynamic Membership. [Thesis]. NSYSU; 2015. Available from: http://etd.lib.nsysu.edu.tw/ETD-db/ETD-search/view_etd?URN=etd-0712115-101414

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Penn State University

28. Pohly, Devin James. Practical Multichannel Secret Sharing Protocols: Architecture, Analysis, and Application.

Degree: 2016, Penn State University

 In recent years, the Internet has risen to prominence as the world's most important means of communication. Entertainment, education, business, and personal interactions have all… (more)

Subjects/Keywords: security; multichannel; secret sharing; protocols; networks; content delivery networks; privacy; streaming media

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Pohly, D. J. (2016). Practical Multichannel Secret Sharing Protocols: Architecture, Analysis, and Application. (Thesis). Penn State University. Retrieved from https://submit-etda.libraries.psu.edu/catalog/1n79h429p

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

Pohly, Devin James. “Practical Multichannel Secret Sharing Protocols: Architecture, Analysis, and Application.” 2016. Thesis, Penn State University. Accessed December 03, 2020. https://submit-etda.libraries.psu.edu/catalog/1n79h429p.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

Pohly, Devin James. “Practical Multichannel Secret Sharing Protocols: Architecture, Analysis, and Application.” 2016. Web. 03 Dec 2020.

Vancouver:

Pohly DJ. Practical Multichannel Secret Sharing Protocols: Architecture, Analysis, and Application. [Internet] [Thesis]. Penn State University; 2016. [cited 2020 Dec 03]. Available from: https://submit-etda.libraries.psu.edu/catalog/1n79h429p.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

Pohly DJ. Practical Multichannel Secret Sharing Protocols: Architecture, Analysis, and Application. [Thesis]. Penn State University; 2016. Available from: https://submit-etda.libraries.psu.edu/catalog/1n79h429p

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


Universidade de Lisboa

29. André, Fernando Martins, 1982-. Availability and confidentiality in storage clouds.

Degree: 2011, Universidade de Lisboa

Tese de mestrado em Segurança Informática, apresentada à Universidade de Lisboa, através da Faculdade de Ciências, 2011

Cloud Computing (computação na nuvem) e Cloud Storage… (more)

Subjects/Keywords: Armazenamento na nuvem; Disponibilidade; Confidencialidade; Erasure codes; Secret sharing; Depsky; Teses de mestrado - 2011

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

André, Fernando Martins, 1. (2011). Availability and confidentiality in storage clouds. (Thesis). Universidade de Lisboa. Retrieved from http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/8863

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Chicago Manual of Style (16th Edition):

André, Fernando Martins, 1982-. “Availability and confidentiality in storage clouds.” 2011. Thesis, Universidade de Lisboa. Accessed December 03, 2020. http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/8863.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

MLA Handbook (7th Edition):

André, Fernando Martins, 1982-. “Availability and confidentiality in storage clouds.” 2011. Web. 03 Dec 2020.

Vancouver:

André, Fernando Martins 1. Availability and confidentiality in storage clouds. [Internet] [Thesis]. Universidade de Lisboa; 2011. [cited 2020 Dec 03]. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/8863.

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation

Council of Science Editors:

André, Fernando Martins 1. Availability and confidentiality in storage clouds. [Thesis]. Universidade de Lisboa; 2011. Available from: http://www.rcaap.pt/detail.jsp?id=oai:repositorio.ul.pt:10451/8863

Note: this citation may be lacking information needed for this citation format:
Not specified: Masters Thesis or Doctoral Dissertation


University of Plymouth

30. Al-Adhami, Ayad. A secure quorum based multi-tag RFID system.

Degree: PhD, 2018, University of Plymouth

 Radio Frequency Identification (RFID) technology has been expanded to be used in different fields that need automatic identifying and verifying of tagged objects without human… (more)

Subjects/Keywords: RFID security; authentication and privacy; cryptography; ECC; secret sharing; Multi-tag authentication

Record DetailsSimilar RecordsGoogle PlusoneFacebookTwitterCiteULikeMendeleyreddit

APA · Chicago · MLA · Vancouver · CSE | Export to Zotero / EndNote / Reference Manager

APA (6th Edition):

Al-Adhami, A. (2018). A secure quorum based multi-tag RFID system. (Doctoral Dissertation). University of Plymouth. Retrieved from http://hdl.handle.net/10026.1/12821

Chicago Manual of Style (16th Edition):

Al-Adhami, Ayad. “A secure quorum based multi-tag RFID system.” 2018. Doctoral Dissertation, University of Plymouth. Accessed December 03, 2020. http://hdl.handle.net/10026.1/12821.

MLA Handbook (7th Edition):

Al-Adhami, Ayad. “A secure quorum based multi-tag RFID system.” 2018. Web. 03 Dec 2020.

Vancouver:

Al-Adhami A. A secure quorum based multi-tag RFID system. [Internet] [Doctoral dissertation]. University of Plymouth; 2018. [cited 2020 Dec 03]. Available from: http://hdl.handle.net/10026.1/12821.

Council of Science Editors:

Al-Adhami A. A secure quorum based multi-tag RFID system. [Doctoral Dissertation]. University of Plymouth; 2018. Available from: http://hdl.handle.net/10026.1/12821

[1] [2] [3]

.