X
Search Filters
Format Format
Format Format
X
Sort by Item Count (A-Z)
Filter by Count
Journal Article (1236) 1236
Conference Proceeding (449) 449
Book / eBook (383) 383
Publication (120) 120
Book Chapter (54) 54
Dissertation (43) 43
Government Document (19) 19
Magazine Article (15) 15
Newspaper Article (15) 15
Trade Publication Article (9) 9
Patent (8) 8
Paper (2) 2
Transcript (2) 2
Book Review (1) 1
Reference (1) 1
more...
Subjects Subjects
Subjects Subjects
X
Sort by Item Count (A-Z)
Filter by Count
cryptography (638) 638
secret sharing (544) 544
computer science (365) 365
physics, multidisciplinary (268) 268
security (250) 250
quantum secret sharing (248) 248
protocols (240) 240
computer science, information systems (227) 227
quantum physics (202) 202
physics (194) 194
secret (193) 193
computer science, theory & methods (190) 190
engineering, electrical & electronic (190) 190
data encryption (170) 170
entanglement (170) 170
secret service (165) 165
computer communication networks (146) 146
history (145) 145
data structures, cryptology and information theory (142) 142
analysis (141) 141
cryptanalysis (140) 140
steganography (140) 140
telecommunications (139) 139
quantum cryptography (127) 127
privacy (125) 125
computer security (124) 124
cryptology (124) 124
authentication (122) 122
physics, general (116) 116
secret writing (114) 114
physics, mathematical (112) 112
computers (109) 109
electronic books (109) 109
algorithms (105) 105
intelligence service (102) 102
mathematics (100) 100
united states (99) 99
protection (98) 98
protocol (96) 96
scheme (96) 96
security measures (92) 92
kryptologie (90) 90
encryption (87) 87
criptografía (86) 86
quantum computing (86) 86
theoretical, mathematical and computational physics (84) 84
information (83) 83
elementary particles, quantum field theory (82) 82
mathematics, applied (80) 80
world war, 1939-1945 (80) 80
data security (78) 78
communication (77) 77
computer systems (77) 77
coding and information theory (76) 76
trade secrets (76) 76
cybersecurity (75) 75
computer privacy (74) 74
computer system security (74) 74
cyber security (74) 74
electronic digital computers (74) 74
management of computing and information systems (74) 74
mathematical physics (74) 74
protection of computer systems (74) 74
security of computer systems (74) 74
channels (73) 73
quantum information technology, spintronics (73) 73
verifiable secret sharing (73) 73
secret sharing scheme (70) 70
computer science, hardware & architecture (68) 68
computation (67) 67
data encoding (67) 67
encryption of data (67) 67
key distribution (67) 67
access control (66) 66
computer networks (66) 66
spies (66) 66
computer information security (65) 65
verschlüsselung (65) 65
efficient (64) 64
multi-user (63) 63
communications engineering, networks (62) 62
teleportation (62) 62
servers (61) 61
algorithm analysis and problem complexity (60) 60
cryptographie (60) 60
discrete mathematics in computer science (60) 60
information security (60) 60
systems and data security (60) 60
management (59) 59
computer science, software engineering (58) 58
espionage (58) 58
biography (57) 57
data protection (57) 57
networks (56) 56
congresses (55) 55
polynomials (55) 55
cryptographic protocols (54) 54
combinatorics (53) 53
secure direct communication (53) 53
kongress (52) 52
more...
Library Location Library Location
Library Location Library Location
X
Sort by Item Count (A-Z)
Filter by Count
Robarts - Stacks (218) 218
Trinity College (John W Graham) - Stacks (72) 72
UofT at Mississauga - Stacks (48) 48
Collection Dvlpm't (Acquisitions) - Vendor file (39) 39
St. Michael's College (John M. Kelly) - 2nd Floor (38) 38
UofT at Scarborough - Stacks (30) 30
UTL at Downsview - May be requested (22) 22
Online Resources - Online (17) 17
Gerstein Science - Stacks (16) 16
Victoria University E.J. Pratt - Stacks (15) 15
Engineering & Comp. Sci. - Stacks (11) 11
Collection Dvlpm't (Acquisitions) - Closed Orders (10) 10
Mathematical Sciences - Stacks (8) 8
Baycrest Hospital - Resident/Client Library (6) 6
Law (Bora Laskin) - Stacks (4) 4
Thomas Fisher Rare Book - Rare Book (4) 4
UofT Schools - Stacks (4) 4
Engineering & Comp. Sci. - Missing (3) 3
OISE - Stacks (3) 3
Criminology - Stacks (2) 2
Law (Bora Laskin) - Closed Orders (2) 2
Mathematical Sciences - Missing (2) 2
Trinity College (John W Graham) - Churchill (2) 2
Trinity College (John W Graham) - Reference (2) 2
Trinity College (John W Graham) - Storage (2) 2
University College (Laidlaw) - Stacks (2) 2
Faculty of Information - May be requested in 6-10 wks (1) 1
Innis College - Stacks (1) 1
Physics - Stacks (1) 1
Pontifical Inst. Mediaeval Studies - Guest (1) 1
Richard Charles Lee Canada-Hong Kong - Library use only (1) 1
Robarts - Not Returned (1) 1
Robarts - Protected Material (1) 1
Robarts - Storage (1) 1
Royal Ontario Museum - Stacks (1) 1
St. Augustine's Seminary - Stacks (1) 1
St. Michael's College (John M. Kelly) - 1st Floor (1) 1
UofT at Mississauga - Missing (1) 1
UofT at Mississauga - Reference (1) 1
more...
Language Language
Language Language
X
Sort by Item Count (A-Z)
Filter by Count
English (2066) 2066
Japanese (55) 55
Chinese (27) 27
Spanish (10) 10
French (7) 7
German (5) 5
Korean (5) 5
Czech (2) 2
Russian (1) 1
Turkish (1) 1
more...
Publication Date Publication Date
Click on a bar to filter by decade
Slide to change publication date range


IEEE Transactions on Computers, ISSN 0018-9340, 06/2010, Volume 59, Issue 6, pp. 842 - 846
Journal Article
Modern Physics Letters A, ISSN 0217-7323, 09/2019, Volume 34, Issue 27, p. 1950213
Quantum secret sharing protocol, which lets a master share a secret with his/her agents and the agents can recover the master’s secret when they collaborate,... 
entanglement state | GROVER ALGORITHM | INFORMATION | ENTANGLEMENT | W-state | PHYSICS, NUCLEAR | PHYSICS, MATHEMATICAL | SCHEME | ASTRONOMY & ASTROPHYSICS | SECURITY | semi-quantum | quantum secret sharing | PHYSICS, PARTICLES & FIELDS
Journal Article
by Dou, Z and Xu, G and Chen, XB and Yuan, KG
CMC-COMPUTERS MATERIALS & CONTINUA, ISSN 1546-2218, 2019, Volume 58, Issue 2, pp. 335 - 347
Rational participants want to maximize their benefits. The protocol with rational participants will be more realistic than the protocol with honest,... 
STEGANOGRAPHY | general steps | MATHEMATICS, INTERDISCIPLINARY APPLICATIONS | ENGINEERING, MULTIDISCIPLINARY | rational protocol | MATERIALS SCIENCE, MULTIDISCIPLINARY | Quantum secret sharing | CONTROLLED TELEPORTATION | Protocol | Utilities
Journal Article
Optics Communications, ISSN 0030-4018, 09/2008, Volume 281, Issue 17, pp. 4553 - 4554
In a recent paper [Z.J. Zhang et al., Opt. Commun. 269 (2007) 418], a protocol of multiparty quantum secret sharing was presented. We study the security of... 
Entanglement swapping | Quantum secret sharing | WOJCIKS EAVESDROPPING ATTACK | PING-PONG PROTOCOL | OPTICS | quantum secret sharing | ENTANGLEMENT | entanglement swapping
Journal Article
Physica Scripta, ISSN 0031-8949, 07/2014, Volume 89, Issue 7, pp. 75104 - 9
A quantum secret-sharing (QSS) protocol consists of two main phases, called sharing and reconstruction. In the first phase, the dealer selects a secret,... 
quantum secret sharing | fair reconstruction | partially and maximally entangled state | SCHEME | PHYSICS, MULTIDISCIPLINARY | SECURITY | IMPROVEMENT | ATTACK | CRYPTANALYSIS | BELL | Reconstruction | Broadcasting | Entangled states | Phases | Interactive | Channels
Journal Article
International Journal of Theoretical Physics, ISSN 0020-7748, 4/2019, Volume 58, Issue 4, pp. 1128 - 1137
In this paper, a novel multiparty quantum sealed-bid auction protocol based on secret sharing is proposed. We present a novel post-confirmation mechanism... 
Theoretical, Mathematical and Computational Physics | Privacy-preserving | Post-confirmation | Quantum Physics | Secret sharing | Physics, general | Quantum sealed-bid auction | Physics | Elementary Particles, Quantum Field Theory | BID AUCTION | PHYSICS, MULTIDISCIPLINARY | IMPROVEMENT | Computer science | Auctions
Journal Article
Optics Communications, ISSN 0030-4018, 01/2007, Volume 269, Issue 2, pp. 418 - 422
Based on the famous quantum secure direct communication protocol (i.e., the Boström–Felbinger protocol) [Phys. Rev. Lett. 89 (2002) 187902] and its... 
Boström–Felbinger protocol | Quantum entanglement | Quantum secret sharing | Boström-Felbinger protocol | ENTANGLEMENT | quantum entanglement | STATE | WOJCIKS EAVESDROPPING ATTACK | PING-PONG PROTOCOL | OPTICS | quantum secret sharing | Bostrom-Felbinger protocol | Atoms | Computer network protocols
Journal Article
International Journal of Theoretical Physics, ISSN 0020-7748, 8/2017, Volume 56, Issue 8, pp. 2512 - 2520
Recently, Xie et al. Int. J. Theor. Phys. 54, 3819–3824, (2015) proposed a Semi-quantum secret sharing protocol (SQSS). Yin et al. Int. J. Theor. Phys. 55:... 
Theoretical, Mathematical and Computational Physics | Cryptanalysis | Quantum Physics | Secret sharing | Physics, general | Semi-quantum | Physics | Elementary Particles, Quantum Field Theory | ATTACKS | PHYSICS, MULTIDISCIPLINARY | KEY DISTRIBUTION
Journal Article
Journal of Parallel and Distributed Computing, ISSN 0743-7315, 06/2019, Volume 128, pp. 57 - 70
Threshold password-authenticated secret sharing (TPASS) protocols allow a client to distribute a secret s amongst n servers and protect it with a password pw,... 
Threshold password-authenticated secret sharing protocol | Diffie–Hellman problems | Shamir secret sharing scheme | ElGamal encryption scheme | Threshold password-authenticated secret | Diffie-Hellman problems | SECURE | COMPUTER SCIENCE, THEORY & METHODS | sharing protocol | KEY | Computer science | Cloud computing | Analysis
Journal Article
Computers and Mathematics with Applications, ISSN 0898-1221, 2012, Volume 63, Issue 2, pp. 564 - 572
One issue which is essential for the security of calculations and communication as well as the ability to guarantee data confidentiality is intelligent... 
Linguistic threshold schemes | Secret sharing | Information management protocols | MATHEMATICS, APPLIED | COMPUTER SCIENCE, INTERDISCIPLINARY APPLICATIONS | SECRET | Knowledge management | Algorithms | Information management | Thresholds | Mathematical analysis | Linguistics | Organizational structure | Division | Conversion | Military
Journal Article
Future Generation Computer Systems, ISSN 0167-739X, 01/2019, Volume 90, pp. 118 - 128
RFID tags have become ubiquitous and cheaper to implement. It is often imperative to design ultralightweight authentication protocols for such tags. Many... 
Low-cost | Mutual authentication | RFID | Secret sharing | Ultralightweight | PRIVACY | SECURITY | COMPUTER SCIENCE, THEORY & METHODS | AUTHENTICATION PROTOCOL | Investment analysis | Radio frequency identification (RFID) | Computer network protocols | Analysis
Journal Article
IEEE Transactions on Computers, ISSN 0018-9340, 11/2013, Volume 62, Issue 11, pp. 2335 - 2336
To achieve secure group communication, one-time session keys need to be shared among group members in a secure and authenticated manner. In this paper, we... 
Protocols | Group key transfer protocol | Authentication | Resists | confidentiality | Broadcasting | Educational institutions | Cryptography | secret sharing | Secret sharing | Confidentiality | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | authentication | ENGINEERING, ELECTRICAL & ELECTRONIC | Research | Computer network protocols | Analysis
Journal Article
IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences, ISSN 0916-8508, 01/2018, Volume E101A, Issue 1, pp. 51 - 63
The performance of secret-sharing (SS)-based multiparty computation (MPC) has recently increased greatly, and several efforts to implement and use it have been... 
Secret sharing | Multiparty computation | Authentication | Password | KEY EXCHANGE | password | COMPUTER SCIENCE, HARDWARE & ARCHITECTURE | PRIVACY | COMPUTER SCIENCE, INFORMATION SYSTEMS | SECURE | multiparty computation | secret sharing | authentication | PARADIGM | ENGINEERING, ELECTRICAL & ELECTRONIC | Computation | Channels | Delay | Passwords
Journal Article
IEEE INFOCOM 2017 - IEEE Conference on Computer Communications, ISSN 0743-166X, 05/2017, pp. 1 - 9
Mobile crowdsensing is a new paradigm in which a requester can recruit a group of mobile users via a platform and coordinate them to perform some sensing tasks... 
Privacy | Protocols | Mobile crowdsensing | user recruitment | Mobile communication | Sensors | Cryptography | sensing quality | secret sharing | Recruitment | User recruitment | Secret sharing | Sensing quality
Conference Proceeding
Quantum Information Processing, ISSN 1570-0755, 8/2014, Volume 13, Issue 8, pp. 1907 - 1916
Journal Article
by Li, Lei and Li, Zhi
International Journal of Theoretical Physics, ISSN 0020-7748, 9/2019, Volume 58, Issue 9, pp. 3081 - 3090
Quantum networks can extend the advantages of quantum key distribution protocols to more than two remote participants. Based on Shamir threshold secret sharing... 
Theoretical, Mathematical and Computational Physics | Quantum Physics | Secret sharing | Physics, general | Quantum key distribution | Physics | Elementary Particles, Quantum Field Theory | Quantam key agreement
Journal Article
by Li, L and Li, Z
INTERNATIONAL JOURNAL OF THEORETICAL PHYSICS, ISSN 0020-7748, 09/2019, Volume 58, Issue 9, pp. 3081 - 3090
Quantum networks can extend the advantages of quantum key distribution protocols to more than two remote participants. Based on Shamir threshold secret sharing... 
Secret sharing | Quantum key distribution | PHYSICS, MULTIDISCIPLINARY | ENTANGLEMENT | Quantam key agreement | Computer network protocols
Journal Article
QUANTUM INFORMATION & COMPUTATION, ISSN 1533-7146, 06/2019, Volume 19, Issue 7-8, pp. 587 - 600
Quantum secret sharing (QSS) is the process of splitting a secret message into multiple parts such that no subset of parts is sufficient to reconstruct the... 
Ring topology | QUANTUM SCIENCE & TECHNOLOGY | Trojan-horse attack | Quantum secret sharing | COMPUTER SCIENCE, THEORY & METHODS | PHYSICS, MATHEMATICAL | EFFICIENT | PHYSICS, PARTICLES & FIELDS
Journal Article
Optics Communications, ISSN 0030-4018, 03/2011, Volume 284, Issue 5, pp. 1468 - 1471
Recently, Shi et al. proposed a multiparty quantum secret sharing (QSS) using Bell states and Bell measurements. In their protocol, for sharing two classical... 
Entanglement swapping | Quantum secret sharing | Bell measurements | SCHEME | ENTANGLEMENT | SINGLE PHOTONS | OPTICS | Bells | Qubits (quantum computing) | Photons | Entanglement
Journal Article
No results were found for your search.

Cannot display more than 1000 results, please narrow the terms of your search.