نتایج جستجو برای: secure information sharing

تعداد نتایج: 1254543  

2011
Ronald Cramer

We define the notion of an arithmetic codex (or codex, for short), and as a special case, arithmetic secret sharing. This notion encompasses as well as generalizes, in a single mathematical framework, all known types of specialized secret sharing schemes from the area of secure multi-party computation, i.e., the so-called (strongly) multiplicative linear secret sharing schemes. These schemes we...

Journal: :How the Brain Got Language 2018

2014
M. Dhanalakshmi V. Balu D. Agrawal C. C. Aggarwal G. Loukides J. H. Shao H. Kargupta S. Datta Q. Wang K. Sivakumar Jaideep Vaidya Chris Clifton L. Guo S. Guo X. Wu Murat Kantarcioglu Bhavani Thuraisingham

Privacy preserving is one of the most important research topics in the data security field and it has become a serious concern in the secure transformation of personal data in recent years. For example, different credit card companies and disease control centers may try to build better data sharing or publishing models for privacy protection through privacy preserving data mining techniques (PP...

2002
Serge Fehr Ueli Maurer

We present a general treatment of all non-cryptographic (i.e., information-theoretically secure) linear verifiable-secret-sharing (VSS) and distributed-commitment (DC) schemes, based on an underlying secret sharing scheme, pairwise checks between players, complaints, and accusations of the dealer. VSS and DC are main building blocks for unconditional secure multi-party computation protocols. Th...

2013
Teng Guo Feng Liu Chuan Kun Wu Ching-Nung Yang Wen Wang YaWei Ren

A (k, n) threshold secret image sharing scheme, abbreviated as (k, n)-TSISS, splits a secret image into n shadow images in such a way that any k shadow images can be used to reconstruct the secret image exactly. In 2002, for (k, n)-TSISS, Thien and Lin reduced the size of each shadow image to 1 k of the original secret image. Their main technique is by adopting all coefficients of a (k − 1)-deg...

2016
Mikio Fujiwara Atsushi Waseda Ryo Nojima Shiho Moriai Wakaha Ogata Masahide Sasaki

Distributed storage plays an essential role in realizing robust and secure data storage in a network over long periods of time. A distributed storage system consists of a data owner machine, multiple storage servers and channels to link them. In such a system, secret sharing scheme is widely adopted, in which secret data are split into multiple pieces and stored in each server. To reconstruct t...

2003
Alexander Levine Vassilis Prevelakis John Ioannidis Sotiris Ioannidis Angelos D. Keromytis

Collaboration over the Internet depends on the ability of the members of a group to exchange data in a secure yet unobtrusive manner. WebDAVA is a system that allows users to define their own access-control policies to network resources that they control, enabling secure data sharing within an enterprise. Our design allows users to selectively give fine-grain access to their resources without i...

, , Alipour-Irangh, Sakineh, Hassanzade, Mohammad,

Background and Aim: The purpose of this study was to investigate the relationship between social capital and knowledge sharing at national information centers in Iran. Method: This applied research was carried out using two questionnaires and a checklist. Data were collected from all the managers, but stratified random sample of staff members of three:  main national information centers (Nation...

Journal: :Journal of the Association for Information Science and Technology 2015

Journal: :Housing, Care and Support 2009

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید