-
1
-
2
Dynamic secret sharing for enhanced cloud security: Tackling eavesdropping and threshold attacks
Published 2025-06-01Subjects: Get full text
Article -
3
Geometric realization of electronic elections based on threshold secret sharing
Published 2018-07-01Subjects: Get full text
Article -
4
Complexity calculation of coding and information security system based on threshold secret sharing scheme used for electronic voting
Published 2017-10-01Subjects: Get full text
Article