Cited By
View all- Saeidi ZYazdi AMashhadi SHadian MGutub A(2023)High performance image steganography integrating IWT and Hamming code within secret sharingIET Image Processing10.1049/ipr2.1293818:1(129-139)Online publication date: 28-Sep-2023
- Luo JZhang LLin FLin C(2020)Efficient Threshold Function Secret Sharing With Information-Theoretic SecurityIEEE Access10.1109/ACCESS.2019.29636778(6523-6532)Online publication date: 2020
- Jiang ZLiu LPang L(2018)Research on oblivious keyword search protocols with CKA securityInternational Journal of Communication Systems10.1002/dac.376631:15Online publication date: 31-Jul-2018