메뉴 건너뛰기




Volumn 32, Issue 2, 2012, Pages 175-181

DNA-like linguistic secret sharing for strategic information systems

Author keywords

Information management; Mathematical linguistics; Secret sharing protocols

Indexed keywords

COMPUTATIONAL COMPLEXITY; COMPUTATIONAL LINGUISTICS; CRYPTOGRAPHY; DNA; DNA SEQUENCES; INFORMATION USE; STEGANOGRAPHY;

EID: 84857781918     PISSN: 02684012     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ijinfomgt.2011.11.016     Document Type: Article
Times cited : (50)

References (18)
  • 1
    • 0028114541 scopus 로고
    • Molecular computation of solutions to combinatorial problems
    • L.M. Adleman Molecular computation of solutions to combinational problems Science 266 5187 1994 1021 1024 (Pubitemid 24373714)
    • (1994) Science , vol.266 , Issue.5187 , pp. 1021-1024
    • Adleman, L.M.1
  • 5
    • 84874800178 scopus 로고
    • A public key cryptosystem and a signature scheme based on discrete logarithms
    • T. ElGamal A public key cryptosystem and a signature scheme based on discrete logarithms IEEE Transactions on Information Theory 1985 469 472
    • (1985) IEEE Transactions on Information Theory , pp. 469-472
    • Elgamal, T.1
  • 10
    • 73349136579 scopus 로고    scopus 로고
    • Shadow generation protocol in linguistic threshold schemes
    • D. Ślȩzak, T.-H. Kim, W.-C. Fang, K.P. Arnett, Springer-Verlag Berlin, Heidelberg
    • M.R. Ogiela, and U. Ogiela Shadow generation protocol in linguistic threshold schemes D. Ślȩzak, T.-h. Kim, W.-C. Fang, K.P. Arnett, Security technology: Communication in computer and information science Vol. 58 2009 Springer-Verlag Berlin, Heidelberg 35 42
    • (2009) Security Technology: Communication in Computer and Information Science , vol.58 , pp. 35-42
    • Ogiela, M.R.1    Ogiela, U.2
  • 11
    • 77955715077 scopus 로고    scopus 로고
    • The use of mathematical linguistic methods in creating secret sharing threshold algorithms
    • M.R. Ogiela, and U. Ogiela The use of mathematical linguistic methods in creating secret sharing threshold algorithms Computers and Mathematics with Applications 60 2 2010 267 271
    • (2010) Computers and Mathematics with Applications , vol.60 , Issue.2 , pp. 267-271
    • Ogiela, M.R.1    Ogiela, U.2
  • 17
    • 15944409593 scopus 로고    scopus 로고
    • Simple secret sharing and threshold RSA signature schemes
    • S. Tang Simple secret sharing and threshold RSA signature schemes Journal of Information and Computational Science 1 2004 259 262 (Pubitemid 40443231)
    • (2004) Journal of Information and Computational Science , vol.1 , Issue.2 , pp. 259-262
    • Tang, S.1
  • 18
    • 33748938054 scopus 로고    scopus 로고
    • New field of cryptography: DNA cryptography
    • DOI 10.1007/s11434-006-2012-5
    • G. Xiao, M. Lu, L. Qin, and X. Lai New field of cryptography: DNA cryptography Chinese Science Bulletin 51 12 2006 1413 1420 (Pubitemid 44432186)
    • (2006) Chinese Science Bulletin , vol.51 , Issue.12 , pp. 1413-1420
    • Xiao, G.1    Lu, M.2    Qin, L.3    Lai, X.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.