Gene408 发表于 2025-3-23 12:05:52
Detecting Algebraic Manipulation in Leaky Storage Systemsns of .-AMD codes to, (i) robust ramp secret sharing scheme and, (ii) wiretap II channel when the adversary can eavesdrop a . fraction of codeword components and tamper with all components of the codeword.Lament 发表于 2025-3-23 15:48:56
http://reply.papertrans.cn/47/4658/465743/465743_12.png舞蹈编排 发表于 2025-3-23 18:51:24
http://reply.papertrans.cn/47/4658/465743/465743_13.png有抱负者 发表于 2025-3-24 00:21:31
http://reply.papertrans.cn/47/4658/465743/465743_14.png教义 发表于 2025-3-24 02:30:19
http://reply.papertrans.cn/47/4658/465743/465743_15.pngdyspareunia 发表于 2025-3-24 08:56:34
Anderson C.A. Nascimento,Paulo BarretoIncludes supplementary material:鄙视读作 发表于 2025-3-24 13:39:55
Lecture Notes in Computer Sciencehttp://image.papertrans.cn/i/image/465743.jpg顾客 发表于 2025-3-24 16:21:41
https://doi.org/10.1007/978-3-319-49175-2cloud computing; cryptography; formal methods and theory of security; network security; access control; a表示向前 发表于 2025-3-24 19:38:19
Conference proceedings 2016Tacoma, WA, USA, in August 2016. The 14 full papers presented in this volume were carefully reviewed and selected from 40 submissions. They are organized around the following topics: secret sharing; quantum cryptography; visual cryptography; cryptographic protocols; entropy, extractors and privacy..我没有强迫 发表于 2025-3-25 02:31:42
978-3-319-49174-5Springer International Publishing AG 2016