Search for persons
X
?
An Introduction to Secret Sharing; SpringerBriefs in Information Security and Cryptography ,
1
Advanced Topics:
, In:
?
An Introduction to Secret Sharing; SpringerBriefs in Information Security and Cryptography ,
2
Proactive Secret Sharing:
, In:
?
3
An Introduction to Secret Sharing: A Systematic Overview an..
SpringerBriefs in Information Security and Cryptography
?
An Introduction to Secret Sharing; SpringerBriefs in Information Security and Cryptography ,
4
Verifiable Secret Sharing:
, In:
?
An Introduction to Secret Sharing; SpringerBriefs in Information Security and Cryptography ,
5
Adversary Models for Secret Sharing Schemes:
, In:
?
An Introduction to Secret Sharing; SpringerBriefs in Information Security and Cryptography ,
6
Preliminaries:
, In:
?
An Introduction to Secret Sharing; SpringerBriefs in Information Security and Cryptography ,
7
Beyond Threshold Access Structures:
, In:
?
An Introduction to Secret Sharing; SpringerBriefs in Information Security and Cryptography ,
8
Introduction:
, In:
?
An Introduction to Secret Sharing; SpringerBriefs in Information Security and Cryptography ,
9
Robust Secret Sharing:
, In:
?
An Introduction to Secret Sharing; SpringerBriefs in Information Security and Cryptography ,
11
Basic Secret Sharing:
, In:
?
An Introduction to Secret Sharing; SpringerBriefs in Information Security and Cryptography ,
12
Conclusions:
, In:
?
Cooperative Information Systems; Lecture Notes in Computer Science ,
13
A Distributed Architecture for Privacy-Preserving Optimizat..:
, In:
?
Proceedings of the 16th International Conference on Availability, Reliability and Security ,
14