您当前的位置:
首页 >
文章列表页 >
Cloud outsourcing secret sharing scheme against covert adversaries
Papers | 更新时间:2024-06-05
    • Cloud outsourcing secret sharing scheme against covert adversaries

    • Journal on Communications   Vol. 38, Issue 5, Pages: 57-65(2017)
    • DOI:10.11959/j.issn.1000-436x.2017100    

      CLC: TP309.2
    • Online First:2017-05

      Published:25 May 2017

    移动端阅览

  • En ZHANG, Kui GENG, Wei JIN, et al. Cloud outsourcing secret sharing scheme against covert adversaries[J]. Journal on Communications, 2017, 38(5): 57-65. DOI: 10.11959/j.issn.1000-436x.2017100.

  •  
  •  
icon
试读结束,您可以激活您的VIP账号继续阅读。
去激活 >
icon
试读结束,您可以通过登录账户,到个人中心,购买VIP会员阅读全文。
已是VIP会员?
去登录 >

0

Views

3078

下载量

6

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

K-Means clustering outsourcing scheme based on sparse matrix transformation and bounded random perturbation
Anonymous whistleblowers reply scheme based on secret sharing
Role-based abstract modeling of blockchain auction contracts and verification of temporal security and fairness
Light weighted privacy protection ViT inference framework based on secret sharing
Edge computing offloading policies and resource allocation considering system fairness in trusted environments

Related Author

Zhao Wei
Tan Jingwen
Wang Huanran
Han Shuai
Yang Wu
Lai Mingzhu
HE Kun
HUANG Yajing

Related Institution

School of Mathematics and Statistics, Hainan Normal University
School of Computer Science and Technology, Harbin Engineering University
School of Cyber Science and Engineering, Wuhan University
National-level International Science and Technology Cooperation Base of Networked Supporting Software, Jiangxi Normal University
School of Software, East China University of Technology
0