Online data storage using implicit security
From MaRDI portal
Recommendations
Cites work
- scientific article; zbMATH DE number 3135133 (Why is no real title available?)
- scientific article; zbMATH DE number 3915608 (Why is no real title available?)
- scientific article; zbMATH DE number 3511563 (Why is no real title available?)
- scientific article; zbMATH DE number 3996785 (Why is no real title available?)
- scientific article; zbMATH DE number 3303655 (Why is no real title available?)
- Error correction coding. Mathematical methods and algorithms
- Exponentiation modulo a polynomial for data security
- How to share a secret
- Internet voting protocol based on improved implicit security
- New efficient and practical verifiable multi-secret sharing schemes
- On the method of puzzles for key distribution
- The cubic public-key transformation
Cited in
(2)
This page was built for publication: Online data storage using implicit security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q730924)