Perfect secret sharing scheme based on vertex domination set

Due to the fast development in data communication systems and computer networks in recent years, the necessity to protect the secret data has become extremely imperative. Several methods have been proposed to protect the secret data; one of them is the secret sharing scheme. It is a method of distri...

Full description

Saved in:
Bibliographic Details
Main Authors: Al-Saidi, Nadia Mohammed Ghanim, Rajab, N. A., Md. Said, Mohamad Rushdan, Kadhim, K. A.
Format: Article
Language:English
Published: Taylor and Francis 2015
Online Access:http://psasir.upm.edu.my/id/eprint/45803/1/RANK.pdf
http://psasir.upm.edu.my/id/eprint/45803/
https://www.tandfonline.com/doi/abs/10.1080/00207160.2014.941360?journalCode=gcom20
Tags: Add Tag
No Tags, Be the first to tag this record!