2009
DOI: 10.1007/978-3-642-03958-4_28
|View full text |Cite
|
Sign up to set email alerts
|

Secure Information Splitting Using Grammar Schemes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
5

Citation Types

0
22
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
5

Relationship

1
4

Authors

Journals

citations
Cited by 49 publications
(22 citation statements)
references
References 15 publications
0
22
0
Order By: Relevance
“…The development of IT techniques and a need to collect and store increasingly larger sets of secret data resulted in the need to develop new data protection protocols. This is why the class of data sharing algorithms has been enhanced by new solutions, described in the literature as linguistic and biometric threshold schemes …”
Section: Introductionmentioning
confidence: 99%
See 2 more Smart Citations
“…The development of IT techniques and a need to collect and store increasingly larger sets of secret data resulted in the need to develop new data protection protocols. This is why the class of data sharing algorithms has been enhanced by new solutions, described in the literature as linguistic and biometric threshold schemes …”
Section: Introductionmentioning
confidence: 99%
“…1,2,[4][5][6][7][8][9][10][11][12][13][14][15] The development of IT techniques and a need to collect and store increasingly larger sets of secret data resulted in the need to develop new data protection protocols. This is why the class of data sharing algorithms has been enhanced by new solutions, described in the literature as linguistic 12,[14][15][16][17] and biometric threshold schemes. 10 Linguistic threshold schemes have been designed for the needs of data protection and are executed by means of linguistic methods.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation
“…Publications describe various examples of data securitization protocols. [1][2][3][4][5][6][7][8] The algorithms of data splitting and sharing 9 are a special example of protocols used for the processes of data securitization. 7,8,[10][11][12][13][14] In this group of protocols, apart from the classic information splitting algorithms, there are also new classes of threshold schemes, including both linguistic and biometric threshold schemes.…”
Section: Introductionmentioning
confidence: 99%
“…15 A detailed description of these threshold schemes can be found in other works. [3][4][5][9][10][11][12][13][14][15][16][17] In this work, we shall discuss new classes of threshold schemes based on cognitive processes of concealed data description. The gist of the proposed solution is a possibility to specify some nonrepetitive semantic features of the concealed data and the application of such type of information in the process of its concealment.…”
Section: Introductionmentioning
confidence: 99%