您当前的位置:
首页 >
文章列表页 >
Cheater identification in threshold scheme
更新时间:2024-10-14
    • Cheater identification in threshold scheme

    • Issue 12, Pages: 136-139(2005)
    • CLC: TN918
    • Published:2005

    移动端阅览

  • DUAN Xiao-yi1, QI Wen-hua1, ZHANG Qi-shan1, et al. Cheater identification in threshold scheme[J]. 2005, (12): 136-139. DOI:

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

641

下载量

0

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

(t, n) threshold secret sharing scheme without SDC
New key management scheme of wireless sensor networks based on key relation table
Provably secure secret sharing scheme based on bilinear maps
Effects of Annealing Atmosphere and Temperature on the Structure and Photoluminescence of ZnO Films Prepared by Pulsed Laser Deposition
Influence of pH Value in Precursor Solution on the Component, Morphology and Photoluminescence of Ca2Zn4Ti16O38 ∶ Pr3+, Na+ Phosphor

Related Author

ZHOU Fu-cai
LIN Long
WANG Jin-ying
XU Jian
HUANG Hai-ping1
WANG Ru-chuan1
SUN Li-juan1
CHEN Zhi1

Related Institution

School of Information Science & Engineering,Northeastern University
东北大学信息科学与工程学院
Institute of Computer Science and Technology,Nanjing University of Posts and Telecommunications
State Key Laboratory for Novel Software Technology,Nanjing University
南京大学计算机软件新技术国家重点实验室
0