Articles with "sharing scheme" as a keyword



Photo by alex_andrews from unsplash

Distortion less secret image sharing scheme for Internet of Things system

Sign Up to like & get
recommendations!
Published in 2017 at "Cluster Computing"

DOI: 10.1007/s10586-017-1345-y

Abstract: Secret image sharing is the study of sharing a secret image with several participants to prevent the malicious participant obtaining information about the secret image. Traditional methods generate meaningless shares, which are unintelligible and easily… read more here.

Keywords: image; system; secret image; image sharing ... See more keywords
Photo from wikipedia

Hybrid image sharing scheme using non-recursive hash key based stream cipher

Sign Up to like & get
recommendations!
Published in 2018 at "Multimedia Tools and Applications"

DOI: 10.1007/s11042-018-6663-4

Abstract: This paper proposes an efficient (k, n)-Hybrid image sharing scheme (HISS) using non-recursive hash key based stream cipher. The sequence generated using non-linear based boolean function is used to construct the Toeplitz matrix to generate… read more here.

Keywords: non recursive; image; stream; hybrid image ... See more keywords
Photo by krakenimages from unsplash

Secure and Efficient Secret Sharing Scheme with General Access Structures Based on Elliptic Curve and Pairing

Sign Up to like & get
recommendations!
Published in 2017 at "Wireless Personal Communications"

DOI: 10.1007/s11277-016-3619-8

Abstract: Secret sharing techniques allow a secret to be shared among n participants in such a way that a specified subset of participant can reconstruct the secret by combining their shares. Secret sharing techniques are now… read more here.

Keywords: secret sharing; scheme; sharing scheme; elliptic curve ... See more keywords
Photo by goian from unsplash

A New Gradual Secret Sharing Scheme with Diverse Access Structure

Sign Up to like & get
recommendations!
Published in 2018 at "Wireless Personal Communications"

DOI: 10.1007/s11277-017-5187-y

Abstract: A multi-secret sharing scheme tries to share multiple secrets among a group of players in such a way that co-operation of pre-specified subsets of them, called access structures, can reconstruct the secrets. Existing methods allow… read more here.

Keywords: access structure; new gradual; secret sharing; sharing scheme ... See more keywords
Photo from wikipedia

The public bicycle-sharing scheme in Brisbane, Australia: evaluating the influence of its introduction on changes in time spent cycling amongst a middle- and older-age population

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of transport and health"

DOI: 10.1016/j.jth.2018.07.003

Abstract: Abstract Background Active travel may improve individual health as it contributes to higher levels of physical activity, particularly in an aging society. Bicycle-sharing schemes may contribute to public health by encouraging active travel. Aim To… read more here.

Keywords: bicycle sharing; spent cycling; sharing scheme; bicycle ... See more keywords
Photo from wikipedia

A spatial analysis of demand patterns on a bicycle sharing scheme: Evidence from London

Sign Up to like & get
recommendations!
Published in 2021 at "Journal of Transport Geography"

DOI: 10.1016/j.jtrangeo.2021.103125

Abstract: Abstract This paper investigates the spatial demand for bikesharing through the application of a series of trip generation models for the London Bicycle Sharing Scheme (LBSS). The production of trips from and the arrival of… read more here.

Keywords: spatial analysis; bicycle sharing; sharing scheme; analysis demand ... See more keywords
Photo by krakenimages from unsplash

Verifiable secret sharing scheme without dealer based on vector space access structures over bilinear groups

Sign Up to like & get
recommendations!
Published in 2018 at "Electronics Letters"

DOI: 10.1049/el.2017.1840

Abstract: In general, most of the previous secret sharing schemes involve a secret dealer and a number of participants. The dealer generates a secret and then distributes the secret shares to the participants in a centralised… read more here.

Keywords: dealer; scheme without; secret sharing; scheme ... See more keywords
Photo by giamboscaro from unsplash

Improvement of a (t,n) Threshold d−Level Quantum Secret Sharing Scheme

Sign Up to like & get
recommendations!
Published in 2020 at "Journal of Applied Security Research"

DOI: 10.1080/19361610.2020.1840894

Abstract: Recently, a threshold d − level quantum secret sharing scheme was presented by Song et al. However, Kao et al. showed that in contrary to Song claim, the reconstructor cannot recover the secret wit... read more here.

Keywords: level quantum; threshold level; secret sharing; quantum secret ... See more keywords
Photo by brittaniburns from unsplash

A Full Diversity Cooperative Spectrum Sharing Scheme for Cognitive Radio Networks

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Access"

DOI: 10.1109/access.2017.2732221

Abstract: This paper presents an enhanced cooperative spectrum sharing scheme in a cognitive radio network, which consists of two pairs: a primary transmitter-primary receiver pair and a secondary base station-secondary receiver pair. The developed scheme is… read more here.

Keywords: scheme cognitive; diversity; spectrum sharing; cooperative spectrum ... See more keywords
Photo by dtopkin1 from unsplash

R²PEDS: A Recoverable and Revocable Privacy-Preserving Edge Data Sharing Scheme

Sign Up to like & get
recommendations!
Published in 2020 at "IEEE Internet of Things Journal"

DOI: 10.1109/jiot.2020.2997389

Abstract: Edge servers (ESs) are utilized to achieve the storage and sharing of IoT data. However, even if ES brings us much benefit, it also leads to many serious privacy leakage issues because users’ data in… read more here.

Keywords: scheme; recoverable revocable; privacy preserving; sharing scheme ... See more keywords
Photo by ldxcreative from unsplash

A Secure Data Sharing Scheme in Community Segmented Vehicular Social Networks for 6G

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Transactions on Industrial Informatics"

DOI: 10.1109/tii.2022.3188963

Abstract: The use of aerial base stations, AI cloud, and satellite storage can help manage location, traffic, and specific application-based services for vehicular social networks. However, sharing of such data makes the vehicular network vulnerable to… read more here.

Keywords: data sharing; social networks; community; vehicular social ... See more keywords