Sign Up to like & get
recommendations!
0
Published in 2017 at "Personal and Ubiquitous Computing"
DOI: 10.1007/s00779-017-1017-1
Abstract: Electronic identity card information in online sensor network environment is closely related to privacy issues because of their characteristics, and this should be widely considered as an issue related to personal privacy rather than simply…
read more here.
Keywords:
electronic identity;
information;
secret sharing;
eid cards ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2021 at "Distributed and Parallel Databases"
DOI: 10.1007/s10619-021-07362-x
Abstract: Biometric strategy is primarily followed for authentication which incorporates the distinct recognition of the individual depending on their physical or behavioral features. Among all the biometrics techniques, ‘Iris scanning’ is touted to be the most…
read more here.
Keywords:
secure secret;
secret sharing;
scheme;
secure ... See more keywords
Photo from archive.org
Sign Up to like & get
recommendations!
0
Published in 2020 at "International Journal of Theoretical Physics"
DOI: 10.1007/s10773-020-04501-5
Abstract: Based on the continuous-variable GHZ states, an efficient ( n , n ) quantum secret sharing protocol is designed, where the Dealer can distribute the various shares to different participants at one time. Likewise, every…
read more here.
Keywords:
variable ghz;
continuous variable;
based continuous;
secret sharing ... See more keywords
Photo from archive.org
Sign Up to like & get
recommendations!
0
Published in 2021 at "International Journal of Theoretical Physics"
DOI: 10.1007/s10773-020-04688-7
Abstract: As is known to all that entities authentication can provides secure communication for QSS protocol. In this paper, the authors propose a novel semi-quantum secret sharing (SQSS) scheme where identity authentication is adopted to verify…
read more here.
Keywords:
type states;
secret sharing;
based ghz;
quantum secret ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-017-5306-5
Abstract: In contemporary society, people can easily use any smart device at hand to capture images of scenery and upload them to cloud storage. Cloud storage is widely used for storing user generated multimedia content. However,…
read more here.
Keywords:
histogram;
cloud storage;
secret sharing;
images cloud ... See more keywords
Photo from archive.org
Sign Up to like & get
recommendations!
1
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-6478-3
Abstract: Visual secret sharing (VSS) technology encodes a secret image into some share images for sharing some classified information. Only when the participants gather and stack their share pictures the secret image would be reconstructed and…
read more here.
Keywords:
security threshold;
visual secret;
random grid;
secret sharing ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2018 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-018-6977-2
Abstract: Secret sharing is a cryptographic tool to ensure reliable and secure access to information. Counting-based secret sharing is a new secret sharing technique that generate the preprocessing shares using simple replacements operations of specific bits.…
read more here.
Keywords:
based secret;
shares generation;
secret sharing;
multimedia ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-019-08351-0
Abstract: Quick response (QR) codes are becoming increasingly popular in various areas of life due to the advantages of the error correction capacity, the ability to be scanned quickly and the capacity to contain meaningful content.…
read more here.
Keywords:
image;
visual secret;
secret image;
meaningful shadows ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-019-7333-x
Abstract: Owing to efficient machine recognition, QR codes have been widely used in many aspects such as information management, electronic identity and mobile payment. Any QR code reader has access to the message contained in a…
read more here.
Keywords:
information;
visual secret;
code;
layer ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2021 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-020-09723-7
Abstract: Cryptography is the process by which a readable message is converted into cipher-text unintelligible to an eavesdropper. With the advent of the internet, improved network infrastructures, and modern applications, electronic-based systems came into existence. Subsequently,…
read more here.
Keywords:
utilization secret;
review;
state art;
secret sharing ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
0
Published in 2021 at "Multimedia Tools and Applications"
DOI: 10.1007/s11042-021-10705-6
Abstract: In the COVID-19 pandemic, telehealth plays a significant role in the e-healthcare. E-health security risks have also risen significantly with the rise in the use of telehealth. This paper addresses one of e-health’s key concerns,…
read more here.
Keywords:
guided patients;
patients privileged;
parity machine;
tree parity ... See more keywords