The use of mathematical linguistic methods in creating secret sharing threshold algorithms (Q604078): Difference between revisions

From MaRDI portal
Set OpenAlex properties.
Import241208061232 (talk | contribs)
Normalize DOI.
 
(4 intermediate revisions by 4 users not shown)
Property / DOI
 
Property / DOI: 10.1016/j.camwa.2010.02.028 / rank
Normal rank
 
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.camwa.2010.02.028 / rank
Normal rank
 
Property / OpenAlex ID
 
Property / OpenAlex ID: W2092990377 / rank
Normal rank
 
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1016/j.camwa.2010.02.028 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2092990377 / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to share a secret / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4818854 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q2757243 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Universally ideal secret-sharing schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Lower bounds for robust secret sharing schemes / rank
 
Normal rank
Property / cites work
 
Property / cites work: Ideal secret sharing schemes with multiple secrets / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q4004196 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Modern computational intelligence methods for the interpretation of medical images / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1016/J.CAMWA.2010.02.028 / rank
 
Normal rank

Latest revision as of 22:02, 9 December 2024

scientific article
Language Label Description Also known as
English
The use of mathematical linguistic methods in creating secret sharing threshold algorithms
scientific article

    Statements

    The use of mathematical linguistic methods in creating secret sharing threshold algorithms (English)
    0 references
    0 references
    0 references
    8 November 2010
    0 references
    mathematical foundations of cryptography
    0 references
    secret sharing protocols
    0 references
    strategic information management
    0 references
    mathematical linguistics
    0 references
    design of cryptographic algorithms
    0 references

    Identifiers