dc.contributor.author |
Slinko, Arkadii |
en |
dc.date.accessioned |
2020-02-11T03:21:00Z |
en |
dc.date.issued |
2020-01-01 |
en |
dc.identifier.issn |
1751-8709 |
en |
dc.identifier.uri |
http://hdl.handle.net/2292/49868 |
en |
dc.language |
English |
en |
dc.publisher |
INST ENGINEERING TECHNOLOGY-IET |
en |
dc.relation.ispartofseries |
IET INFORMATION SECURITY |
en |
dc.rights |
Items in ResearchSpace are protected by copyright, with all rights reserved, unless otherwise indicated. Previously published items are made available in accordance with the copyright policy of the publisher. |
en |
dc.rights.uri |
https://researchspace.auckland.ac.nz/docs/uoa-docs/rights.htm |
en |
dc.subject |
Science & Technology |
en |
dc.subject |
Technology |
en |
dc.subject |
Computer Science, Information Systems |
en |
dc.subject |
Computer Science, Theory & Methods |
en |
dc.subject |
Computer Science |
en |
dc.subject |
matrix algebra |
en |
dc.subject |
cryptographic protocols |
en |
dc.subject |
ideal linear secret sharing schemes |
en |
dc.subject |
secret sharing scheme |
en |
dc.subject |
linear access structures |
en |
dc.title |
Ways to merge two secret sharing schemes |
en |
dc.type |
Journal Article |
en |
dc.identifier.doi |
10.1049/iet-ifs.2019.0210 |
en |
pubs.issue |
1 |
en |
pubs.begin-page |
146 |
en |
pubs.volume |
14 |
en |
dc.rights.holder |
Copyright: The author |
en |
pubs.author-url |
http://gateway.webofknowledge.com/gateway/Gateway.cgi?GWVersion=2&SrcApp=PARTNER_APP&SrcAuth=LinksAMR&KeyUT=WOS:000504266400015&DestLinkType=FullRecord&DestApp=ALL_WOS&UsrCustomerID=6e41486220adb198d0efde5a3b153e7d |
en |
pubs.end-page |
150 |
en |
pubs.publication-status |
Published |
en |
dc.rights.accessrights |
http://purl.org/eprint/accessRights/RestrictedAccess |
en |
pubs.subtype |
Article |
en |
pubs.subtype |
Journal |
en |
pubs.elements-id |
791494 |
en |
pubs.org-id |
Science |
en |
pubs.org-id |
Mathematics |
en |
dc.identifier.eissn |
1751-8717 |
en |