نتایج جستجو برای: secure information sharing

تعداد نتایج: 1254543  

Journal: :Optics Express 2021

Quantum secret sharing (QSS) is an essential primitive for the future quantum internet, which promises secure multiparty communication. However, developing a large-scale QSS network huge challenge due to channel loss and requirement of multiphoton interference or high-fidelity multipartite entanglement distribution. Here, we propose three-user protocol without monitoring signal disturbance, cap...

Journal: :Journal of Computer Security 2012
Gail-Joon Ahn Jing Jin Mohamed Shehab

Ad-hoc collaboration is a newly emerged environment enabling distributed collaborators to share resources. The dynamic nature and unique sharing pattern in ad-hoc collaboration poses great challenges for security services to accommodate both access control and trust management requirements in providing controlled resource sharing. In this paper, we propose a comprehensive, integrated and implem...

2012
Wenjie Yang Futai Zhang

Secret sharing plays an important role in protecting confidential information among all participants. A fairness secret sharing scheme assures that a dishonest participant cannot get any advantages over the honest ones in the process of secret reconstruction. Though there are many secret sharing schemes available in the literature, most of them do not satisfy the requirement of fairness. In thi...

Hajar Kafshian Ahar Mostafa Setak Saeed Alaei

This paper proposes a new motivation for information sharing in a decentralized channel consisting of a single manufacturer and two competing retailers. The manufacturer provides a common product to the retailers at the same wholesale price. Both retailers add their own values to the product and distribute it to consumers. Factors such as retail prices, values added to the product, and local ad...

Journal: :Discrete Applied Mathematics 2006
Paolo D'Arco Wataru Kishimoto Douglas R. Stinson

A secret sharing scheme is a cryptographic protocol by means of which a dealer shares a secret among a set of participants in such a way that it can be subsequently reconstructed by certain qualiied subsets. The setting we consider is the following: in a rst phase, the dealer gives in a secure way a piece of information, called a share, to each participant. Then, participants belonging to a qua...

2005
Ganesh Godavari C. Edward Chow

In this paper, we explore the issues involved with the design and rapid deployment of large scale secure information sharing (SIS) systems for coordination involved with multiple agencies. Procedures and tools were developed for setting up quickly the public key infrastructure (PKI) and privilege management infrastructure (PMI) for the multi-agency SIS systems. A multi-agency SIS testbed based ...

Journal: :International Journal of Security and Its Applications 2016

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید