|
|
Venues (Conferences, Journals, ...)
|
|
GrowBag graphs for keyword ? (Num. hits/coverage)
Group by:
The graphs summarize 43 occurrences of 35 keywords
|
|
|
Results
Found 43 publication records. Showing 43 according to the selection in the facets
Hits ?▲ |
Authors |
Title |
Venue |
Year |
Link |
Author keywords |
117 | Hossein Ghodosi, Josef Pieprzyk, Reihaneh Safavi-Naini |
Secret Sharing in Multilevel and Compartmented Groups. |
ACISP |
1998 |
DBLP DOI BibTeX RDF |
Hierarchical and Compartmented Access Structures, Ideal Schemes, Secret Sharing, Perfect Security |
88 | Tamir Tassa, Nira Dyn |
Multipartite Secret Sharing by Bivariate Interpolation. |
J. Cryptol. |
2009 |
DBLP DOI BibTeX RDF |
Multipartite access structures, Compartmented access structures, Hierarchical threshold access structures, Secret sharing, Bivariate interpolation, Monotone span programs |
88 | Tamir Tassa, Nira Dyn |
Multipartite Secret Sharing by Bivariate Interpolation. |
ICALP (2) |
2006 |
DBLP DOI BibTeX RDF |
multipartite access structures, compartmented access structures, hierarchical threshold access structures, Secret sharing, bivariate interpolation, monotone span programs |
75 | P. C. Clark, M. C. Meissner, K. O. Vance |
Secure Compartmented Data Access over an Untrusted Network using a COTS-based Architecture. |
ACSAC |
2000 |
DBLP DOI BibTeX RDF |
secure compartmented data access, untrusted network, COTS-based architecture, secure network computing architecture, application-level firewalls, DoD applications, software architecture, access control, electronic commerce, computer networks, authorisation, telecommunication security, electronic business, military computing, military applications, sensitive information, commercial-off-the-shelf products, sensitive data |
75 | Jeffrey L. Berger, Jeffrey Picciotto, John P. L. Woodward, Paul T. Cummings |
Compartmented Mode Workstation: Prototype Highlights. |
IEEE Trans. Software Eng. |
1990 |
DBLP DOI BibTeX RDF |
data overclassification prevention, MITRE compartmented mode workstation, highly classified intelligence data, binary compatible, trusted window management system, sensitivity levels, information labels, accurate data labeling, multiple sensitivity levels, software engineering, objects, security of data, workstations, security requirements, markings, security labels |
47 | Qun Zhong |
Providing Secure Environments for Untrusted Network Applications. |
WETICE |
1997 |
DBLP DOI BibTeX RDF |
secure environments, untrusted network applications, VirtualVault, Trusted Sendmail Proxy, network application program bugs, unsafe environment, World Wide Web servers, mailservers, compartmented-mode workstation, applications wrapping, application service transfer, Internet, electronic commerce, case studies, security of data, security breaches |
47 | C. Cant, Simon R. Wiseman |
Simple Assured Bastion Hosts. |
ACSAC |
1997 |
DBLP DOI BibTeX RDF |
assured firewalls, compartmented mode workstation, ITSEC E3 assurance, evaluation effort reuse, bastion host architecture, unevaluated proxies, information exporting, trusted path export sanction, evaluated release checker, authorisation |
41 | Ross J. Anderson |
Privacy Technology Lessons from Healthcare. |
S&P |
2000 |
DBLP DOI BibTeX RDF |
|
29 | Sachin Kumar |
Extending boolean operations-based secret image sharing to compartmented access structure. |
Multim. Tools Appl. |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Alexandru Ionita |
Optimizing Attribute-based Encryption for Circuits using Compartmented Access Structures. |
IACR Cryptol. ePrint Arch. |
2023 |
DBLP BibTeX RDF |
|
29 | Alexandru Ionita |
Optimizing Attribute-Based Encryption for Circuits Using Compartmented Access Structures. |
SECRYPT |
2023 |
DBLP DOI BibTeX RDF |
|
29 | Ferucio Laurentiu Tiplea, Constantin Catalin Dragan |
Asymptotically ideal Chinese remainder theorem -based secret sharing schemes for multilevel and compartmented access structures. |
IET Inf. Secur. |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Guoai Xu, Jiangtao Yuan, Guosheng Xu 0001, Zhongkai Dang |
An Efficient Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations. |
Secur. Commun. Networks |
2021 |
DBLP DOI BibTeX RDF |
|
29 | Jiangtao Yuan, Guoai Xu, Guosheng Xu 0001 |
An Ideal Compartmented Secret Sharing Scheme Based on Linear Homogeneous Recurrence Relations. |
IACR Cryptol. ePrint Arch. |
2020 |
DBLP BibTeX RDF |
|
29 | Qi Chen, Chunming Tang 0003, Zhiqiang Lin |
Compartmented Secret Sharing Schemes and Locally Repairable Codes. |
IEEE Trans. Commun. |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Ferucio Laurentiu Tiplea, Alexandru Ionita, Anca-Maria Nica |
Practically Efficient Attribute-Based Encryption for Compartmented and Multilevel Access Structures. |
ICETE (Selected Papers) |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Ferucio Laurentiu Tiplea, Alexandru Ionita, Anca-Maria Nica |
Practically Efficient Attribute-based Encryption for Compartmented Access Structures. |
ICETE (2) |
2020 |
DBLP DOI BibTeX RDF |
|
29 | Qi Chen, Chunming Tang 0003, Zhiqiang Lin |
Efficient explicit constructions of compartmented secret sharing schemes. |
Des. Codes Cryptogr. |
2019 |
DBLP DOI BibTeX RDF |
|
29 | Ferucio Laurentiu Tiplea, Constantin Catalin Dragan |
Asymptotically Ideal CRT-based Secret Sharing Schemes for Multilevel and Compartmented Access Structures. |
IACR Cryptol. ePrint Arch. |
2018 |
DBLP BibTeX RDF |
|
29 | Xianfang Wang, Can Xiang, Fang-Wei Fu 0001 |
Secret sharing schemes for compartmented access structures. |
Cryptogr. Commun. |
2017 |
DBLP DOI BibTeX RDF |
|
29 | P. Mohamed Fathimal, P. Arockia Jansi Rani |
Threshold Secret Sharing Scheme for Compartmented Access Structures. |
Int. J. Inf. Secur. Priv. |
2016 |
DBLP DOI BibTeX RDF |
|
29 | Sabyasachi Dutta, Tamal Bhore, Avishek Adhikari |
Efficient Construction of Visual Cryptographic Scheme for Compartmented Access Structures. |
IACR Cryptol. ePrint Arch. |
2016 |
DBLP BibTeX RDF |
|
29 | Graham Enos, Yuliang Zheng 0001 |
An ID-based signcryption scheme with compartmented secret sharing for unsigncryption. |
Inf. Process. Lett. |
2015 |
DBLP DOI BibTeX RDF |
|
29 | Appala Naidu Tentu, Prabal Paul, V. Ch. Venkaiah |
Computationally perfect compartmented secret sharing schemes based on MDS codes. |
Int. J. Trust. Manag. Comput. Commun. |
2014 |
DBLP DOI BibTeX RDF |
|
29 | Ali Aydin Selçuk, Ramazan Yilmaz |
Joint Compartmented Threshold Access Structures. |
IACR Cryptol. ePrint Arch. |
2013 |
DBLP BibTeX RDF |
|
29 | Graham Enos, Yuliang Zheng 0001 |
An ID-Based Signcryption Scheme with Compartmented Secret Sharing for Unsigncryption. |
IACR Cryptol. ePrint Arch. |
2012 |
DBLP BibTeX RDF |
|
29 | Yuyin Yu, Mingsheng Wang |
A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure. |
ICICS |
2011 |
DBLP DOI BibTeX RDF |
|
29 | Yuyin Yu, Mingsheng Wang |
A Probabilistic Secret Sharing Scheme for a Compartmented Access Structure. |
IACR Cryptol. ePrint Arch. |
2009 |
DBLP BibTeX RDF |
|
29 | Antonis Economou, Spyridoula Kanta |
Optimal balking strategies and pricing for the single server Markovian queue with compartmented waiting space. |
Queueing Syst. Theory Appl. |
2008 |
DBLP DOI BibTeX RDF |
Mathematics Subject Classification (2000) 60K25, 90B22 |
29 | Sorin Iftene, Stefan Ciobaca, Manuela Grindei |
Compartmented Threshold RSA Based on the Chinese Remainder Theorem. |
IACR Cryptol. ePrint Arch. |
2008 |
DBLP BibTeX RDF |
|
29 | Sebastian Gajek, Ahmad-Reza Sadeghi, Christian Stüble, Marcel Winandy |
Compartmented Security for Browsers - Or How to Thwart a Phisher with Trusted Computing. |
ARES |
2007 |
DBLP DOI BibTeX RDF |
|
29 | Sorin Iftene |
Compartmented Secret Sharing Based on the Chinese Remainder Theorem. |
IACR Cryptol. ePrint Arch. |
2005 |
DBLP BibTeX RDF |
|
29 | Tse Huong Choo |
Vaulted VPN: Compartmented Virtual Private Networks on Trusted Operating SystemsTse-Huong Choo, Hewlett-Packard Laboratories. |
USENIX Security Symposium |
1999 |
DBLP BibTeX RDF |
|
29 | C. Armstrong, R. Venkatraman |
Common Ada bindings to compartmented mode workstations. |
WADAS |
1994 |
DBLP DOI BibTeX RDF |
|
26 | C. L. Robinson, Simon R. Wiseman |
A Consideration of the Modes of Operation for Secure Systems. |
ESORICS |
1994 |
DBLP DOI BibTeX RDF |
Security Mode of Operation, Dedicated, System High, Compartmented, System Model, Z Notation, Multi-Level |
21 | Marianne Hirschbichler, Colin Boyd, Wageeh W. Boles |
A Multiple-Control Fuzzy Vault. |
PST |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Marianne Hirschbichler, Colin Boyd, Wageeh W. Boles |
A Scheme for Enhancing Security Using Multiple Fingerprints and the Fuzzy Vault. |
DICTA |
2008 |
DBLP DOI BibTeX RDF |
|
21 | Oriol Farràs, Jaume Martí-Farré, Carles Padró |
Ideal Multipartite Secret Sharing Schemes. |
EUROCRYPT |
2007 |
DBLP DOI BibTeX RDF |
Ideal access structures, Multipartite secret sharing, Multipartite matroids, Discrete polymatroids, Secret sharing, Ideal secret sharing schemes |
21 | Richard A. Smith |
Background Use of Sensitive Information to Aid in Analysis of Non-sensitive Data on Threats and Vulnerabilities. |
ISI |
2005 |
DBLP DOI BibTeX RDF |
|
21 | John Marchesini, Sean W. Smith, Omen Wild, Joshua Stabiner, Alex Barsamian |
Open-Source Applications of TCPA Hardware. |
ACSAC |
2004 |
DBLP DOI BibTeX RDF |
|
21 | Sotiris Ioannidis, Steven M. Bellovin, John Ioannidis, Angelos D. Keromytis, Jonathan M. Smith |
Design and Implementation of Virtual Private Services. |
WETICE |
2003 |
DBLP DOI BibTeX RDF |
|
21 | Barbara Masucci, Douglas R. Stinson |
Metering Schemes for General Access Structures. |
ESORICS |
2000 |
DBLP DOI BibTeX RDF |
Distributed Audit, Security, Cryptography, Entropy, Metering |
21 | Ernest F. Brickell |
Some Ideal Secret Sharing Schemes. |
EUROCRYPT |
1989 |
DBLP DOI BibTeX RDF |
|
Displaying result #1 - #43 of 43 (100 per page; Change: )
|
|