[1] |
LIU Haifeng, XUE Chao, LIANG Xingliang.
Threshold Scheme Based on Bivariate Lagrange Interpolation Polynomial
[J]. Computer Engineering and Applications, 2019, 55(17): 107-111.
|
[2] |
JIAO Dong1, LI Mingchu1, GUO Cheng1, YU Yan2, OU Jinping3.
Reusable multi-attributes hierarchical threshold scheme
[J]. Computer Engineering and Applications, 2014, 50(10): 7-10.
|
[3] |
ZHOU Mengchuang,YU Zhaoping.
New double-threshold proxy signcryption scheme from bilinear pairings
[J]. Computer Engineering and Applications, 2011, 47(32): 98-100.
|
[4] |
GUO Zhen,ZHANG Jianzhong,LAN Jianqing.
Analysis and improvement of dynamic(t,n) threshold multi-secret sharing scheme
[J]. Computer Engineering and Applications, 2011, 47(3): 110-112.
|
[5] |
LI Rui,ZHANG Jianzhong.
Verifiable multi-secret sharing scheme
[J]. Computer Engineering and Applications, 2011, 47(23): 99-100.
|
[6] |
QIAO Xiaolin,ZHANG Jianzhong.
Multi-stage secret sharing scheme among multiple organizations based on ECC
[J]. Computer Engineering and Applications, 2011, 47(20): 56-57.
|
[7] |
HAN Ning1,YAN Deqin1,HAN Lili2.
Contourlet-domain image watermarking based on visual cryptography
[J]. Computer Engineering and Applications, 2011, 47(1): 170-172.
|
[8] |
WANG Heng-jun1,WANG Ya-di1,YUAN Fang2.
Availability research of distributed CA in mobile Ad Hoc networks
[J]. Computer Engineering and Applications, 2010, 46(10): 88-90.
|
[9] |
GUO Cheng1,2,LI Ming-chu1,WANG Zhi-hui1,2.
Secret sharing scheme based on multi-dealer
[J]. Computer Engineering and Applications, 2009, 45(6): 10-12.
|
[10] |
WEI Yun1,XIONG Guo-hua2,XU Yong-jie3,TIAN Zhi-gang1.
Analysis and design of multiple secret sharing schemes
[J]. Computer Engineering and Applications, 2009, 45(19): 81-82.
|
[11] |
LI Xiong1,LI Zhi-hui1,PENG Qing-yan2.
Efficient and verifiable multi-threshold secret sharing scheme
[J]. Computer Engineering and Applications, 2009, 45(18): 91-93.
|
[12] |
FU Mao-sheng1,2,LUO Bin1.
(t,n) threshold secret sharing scheme without SDC based on ECC
[J]. Computer Engineering and Applications, 2008, 44(32): 85-86.
|
[13] |
ZHANG Yan-yan.
Proactive secure multisecret sharing threshold scheme
[J]. Computer Engineering and Applications, 2007, 43(34): 156-158.
|
[14] |
YU Dan,LIU Huan-ping.
New (t,n) threshold multi-stage secret sharing scheme
[J]. Computer Engineering and Applications, 2007, 43(26): 142-143.
|
[15] |
SHI Run-hua1,ZHONG Hong1,HUANG Liu-sheng2.
Very efficient(t,n) threshold visual secret sharing scheme
[J]. Computer Engineering and Applications, 2007, 43(23): 35-37.
|