default search action
Journal of Information Security and Applications, Volume 23
Volume 23, August 2015
- Lein Harn, Changlu Lin, Yong Li:
Fair secret reconstruction in (t, n) secret sharing. 1-7 - Shreelatha Bhadravati, Pradeep K. Atrey, Majid Khabbazian:
Scalable secret sharing of compressed multimedia. 8-27 - Dheerendra Mishra, Ashok Kumar Das, Ankita Chaturvedi, Sourav Mukhopadhyay:
A secure password-based authentication and key agreement scheme using smart cards. 28-43 - Dheerendra Mishra, Ankita Chaturvedi, Sourav Mukhopadhyay:
Design of a lightweight two-factor authentication scheme with smart card revocation. 44-53 - Dulal C. Kar, Clifton J. Mulkey:
A multi-threshold based audio steganography scheme. 54-67 - Yuan Zhang, Chunxiang Xu, Jining Zhao, Xiaojun Zhang, Junwei Wen:
Cryptanalysis of an integrity checking scheme for cloud data sharing. 68-73
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.