-
1
-
-
33745653332
-
WIPI mobile platform with secure service for mobile RFID network environment
-
DOI 10.1007/11610496-100, Advanced Web and Network Technologies, and Applications - APWeb 2006 International Workshops: XRA, IWSN, MEGA, and ICSE, Proceedings
-
Park, N., Kwak, J., Kim, S., Won, D., Kim, H.: WIPI Mobile Platform with Secure Service for Mobile RFID Network Environment. In: Shen, H. T., Li, J., Li, M., Ni, J., Wang, W. (eds.) APWeb Workshops 2006. LNCS, vol. 3842, pp. 741-748. Springer, Heidelberg (2006) (Pubitemid 43973412)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.3842
, pp. 741-748
-
-
Park, N.1
Kwak, J.2
Kim, S.3
Won, D.4
Kim, H.5
-
2
-
-
0018545449
-
How to share a secret
-
Shamir, A.: How to Share a Secret. Communication of the ACM 22(11), 612-613 (1979)
-
(1979)
Communication of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
3
-
-
84947912552
-
All-or-nothing encryption and the package transform
-
Biham, E. ed., Springer, Heidelberg, FSE 1997
-
Rivest, R. L.: All-or-nothing encryption and the package transform. In: Biham, E. (ed.) FSE 1997. LNCS, vol. 1267, pp. 210-218. Springer, Heidelberg (1997)
-
(1997)
LNCS
, vol.1267
, pp. 210-218
-
-
Rivest, R.L.1
-
4
-
-
77958490152
-
Handling large datasets at google: Current systems and future directions
-
Dean, J.: Handling Large Datasets at Google: Current Systems and Future Directions. In: Data-Intensive Computing Symposium (2008)
-
(2008)
Data-Intensive Computing Symposium
-
-
Dean, J.1
-
5
-
-
33750298289
-
Security analysis and implementation leveraging globally networked mobile RFIDS
-
Cuenca, P., Orozco-Barbosa, L. eds., Springer, Heidelberg, PWC 2006
-
Park, N., Kim, S., Won, D., Kim, H.: Security Analysis and Implementation leveraging Globally Networked Mobile RFIDs. In: Cuenca, P., Orozco-Barbosa, L. (eds.) PWC 2006. LNCS, vol. 4217, pp. 494-505. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4217
, pp. 494-505
-
-
Park, N.1
Kim, S.2
Won, D.3
Kim, H.4
-
6
-
-
56649096110
-
A fast (3, n)-threshold secret sharing scheme using exclusive-or operations
-
Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A fast (3, n)-threshold secret sharing scheme using exclusive-or operations. IEICE Trans. Fundamentals E91-A (1), 127-138 (2008)
-
(2008)
IEICE Trans. Fundamentals
, vol.E91-A
, Issue.1
, pp. 127-138
-
-
Kurihara, J.1
Kiyomoto, S.2
Fukushima, K.3
Tanaka, T.4
-
7
-
-
77951274121
-
Fast (2, n)-threshold scheme and its application
-
Fujii, Y., Tada, M., Hosaka, N., Tochikubo, K., Kato, T.: fast (2, n)-threshold scheme and its application. In: Proc. CSS 2005, pp. 631-636 (2005)
-
(2005)
Proc. CSS 2005
, pp. 631-636
-
-
Fujii, Y.1
Tada, M.2
Hosaka, N.3
Tochikubo, K.4
Kato, T.5
-
8
-
-
77951279064
-
A secret sharing scheme with threshold 3
-
Tada, M., Fujii, Y., Hosaka, N., Tochikubo, K., Kato, T.: A secret sharing scheme with threshold 3. In: Proc. CSS 2005, pp. 637-642 (2005)
-
(2005)
Proc. CSS 2005
, pp. 637-642
-
-
Tada, M.1
Fujii, Y.2
Hosaka, N.3
Tochikubo, K.4
Kato, T.5
-
9
-
-
77958504468
-
Strongly non-separable encryption mode for throwing a media away
-
Kuwakado, H., Tanaka, H.: Strongly non-separable encryption mode for throwing a media away. Technical Report of IEICE 103(417), 15-18 (2003)
-
(2003)
Technical Report of IEICE
, vol.103
, Issue.417
, pp. 15-18
-
-
Kuwakado, H.1
Tanaka, H.2
-
10
-
-
56649086572
-
A new (k, n)-threshold secret sharing scheme and its extension
-
Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. eds., Springer, Heidelberg, ISC 2008
-
Kurihara, J., Kiyomoto, S., Fukushima, K., Tanaka, T.: A New (k, n)-Threshold Secret Sharing Scheme and Its Extension. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 455-470. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5222
, pp. 455-470
-
-
Kurihara, J.1
Kiyomoto, S.2
Fukushima, K.3
Tanaka, T.4
|