Items where Subject is "08 INFORMATION AND COMPUTING SCIENCES > 0804 Data Format > 080401 Coding and Information Theory"

Up a level
Export as [feed] Atom [feed] RSS 1.0 [feed] RSS 2.0 [feed] RSS 2.0
Group by: Creators | Item Type
Jump to: C | G | M | S
Number of items at this level: 13.

C

Corniaux, Christian L.F. (2016) Exploratory designs of unconditionally secure distributed oblivious transfer protocols. PhD thesis, James Cook University.

Corniaux, Christian L.F., and Ghodosi, Hossein (2015) Security analysis of polynomial interpolation-based Distributed Oblivious Transfer protocols. In: Lecture Notes in Computer Science (8949) pp. 363-380. From: ICISC 2014: 17th International Conference on Information Security and Cryptology, 3-5 December 2014, Seoul, South Korea.

Corniaux, Christian L.F., and Ghodosi, Hossein (2014) An entropy-based demonstration of the security of Shamir's secret sharing scheme. In: Proceedings of the International Conference on Information Science, Electronics and Electrical Engineering (1) pp. 46-48. From: ISEEE 2014: International Conference on Information Science, Electronics and Electrical Engineering, 26-28 April 2014, Sapporo, Japan.

Corniaux, Christian L.F., and Ghodosi, Hossein (2013) An information-theoretically secure threshold distributed oblivious transfer protocol. In: Lecture Notes in Computer Science (7839) pp. 184-201. From: 15th International Conference on Information Security and Cryptology, 28-30 November 2012, Seoul, Korea.

Corniaux, Christian L.F., and Ghodosi, Hossein (2012) T-out-of-n distributed oblivious transfer protocols in non-adaptive and adaptive settings. In: Information Security Practice and Experience Conference (ISPEC) 2012 (7232) pp. 123-143. From: 8th International Conference on Information Security Practice and Experience, 9-12 April, Hangzhou, China.

Corniaux, Christian L. F., and Ghodosi, Hossein (2011) A Verifiable Distributed Oblivious Transfer Protocol. In: Lecture Notes in Computer Science (6812) pp. 444-450. From: 16th Australasian Conference on Information Security and Privacy, ACISP 2011, 11-13 July 2011, Melbourne, Australia.

G

Ghodosi, Hossein (2013) Analysis of an unconditionally secure distributed oblivious transfer. Journal of Cryptology, 26 (1). pp. 75-79.

Ghodosi, Hossein, Pieprzyk, Josef, and Steinfeld, Ron (2012) Multi-party computation with conversion of secret sharing. Design, Codes and Cryptography, 62 (3). pp. 259-272.

Ghodosi, Hossein (2011) Comments on Harn-Lin's cheating detection scheme. Designs, Codes and Cryptography, 60 (1). pp. 63-66.

Ghodosi, Hossein, and Pieprzyk, Josef (1999) Repudiation of Cheating and Non-repudiation of Zhang's Proxy Signature Schemes. In: Lecture Notes in Computer Science (1587) pp. 129-134. From: 4th Australasian Conference on Information Security and Privacy, ACISP’99, 7-9 April 1999, Wollongong, Australia.

Ghodosi, Hossein, Piperzyk, Josef, Safavi-Naini, Rei, and Wang, Huaxiong (1998) On construction of cumulative secret sharing schemes. Lecture Notes in Computer Science, 1438. pp. 379-390.

M

Ma, Xiaogang, Wu, Chonglong, Carranza, Emmanuel John M., Schetselaar, Ernst M., van der Meer, Freek D., Liu, Gang, Wang, Xinqing, and Zhang, Xialin (2010) Development of a controlled vocabulary for semantic interoperability of mineral exploration geodata for mining projects. Computers & Geosciences, 36 (12). pp. 1512-1522.

S

Saeednia, Shahrokh, and Ghodosi, Hossein (1999) A self-certified group-oriented cryptosystem without a combiner. Lecture Notes in Computer Science, 1587. pp. 192-201.

This list was generated on Mon Mar 18 22:44:18 2024 AEST.