2012
DOI: 10.1016/j.ijinfomgt.2011.11.016
|View full text |Cite
|
Sign up to set email alerts
|

DNA-like linguistic secret sharing for strategic information systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
24
0

Year Published

2013
2013
2014
2014

Publication Types

Select...
5
3

Relationship

2
6

Authors

Journals

citations
Cited by 55 publications
(24 citation statements)
references
References 9 publications
0
24
0
Order By: Relevance
“…[54]), a construction of secret sharing techniques (see e.g. [39]), etc. Therefore, a set of methodological principles presented in the paper will be extended in the future with new ones connected with the AI paradigms.…”
Section: Discussionmentioning
confidence: 99%
“…[54]), a construction of secret sharing techniques (see e.g. [39]), etc. Therefore, a set of methodological principles presented in the paper will be extended in the future with new ones connected with the AI paradigms.…”
Section: Discussionmentioning
confidence: 99%
“…We can thus assume that the coding will, for example, be executed as presented in Fig 1. One can also start from the assumption that one pair of nucleotides (a single bond) corresponds to one bit of information. Such information coding methods are used in biological solutions which have inspired us to development of a new class of algorithms for secret splitting described in [10]. However, presented algorithm, called a linguistic threshold scheme, operates in a more general way and supports coding secret information (to be split) in longer sequences, i.e.…”
Section: Data Security In Crypto-biometrics Modelmentioning
confidence: 99%
“…containing more than 2 bits of information. The purpose of this algorithm is a threshold split of strategic data managed within hierarchical structures, with varied access capabilities dependent on the rights granted [9,10,11].…”
Section: Data Security In Crypto-biometrics Modelmentioning
confidence: 99%
See 1 more Smart Citation
“…Jansen and Beverly [19] proposed a Threshold Pivot Scheme (TPS) based on the technique of secret sharing [42]. In TPS, a message, considered as the secret, is divided into multiple shares by the technique of secret sharing.…”
Section: Message Content Privacymentioning
confidence: 99%