2020
DOI: 10.1007/s13369-020-04422-9
|View full text |Cite
|
Sign up to set email alerts
|

Trustworthy Target Key Alteration Helping Counting-Based Secret Sharing Applicability

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
16
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
8
1
1

Relationship

1
9

Authors

Journals

citations
Cited by 33 publications
(16 citation statements)
references
References 47 publications
0
16
0
Order By: Relevance
“…Likewise, this open issue lacks studies that attempt to analyze users' sentiments about issues related to the Hajj and Umrah system. Moreover, more research efforts should be made to study the performance [ 147 ], accuracy [ 148 ], and reliability [ 149 ] of sentiment analysis methods and their application to commonly used languages [ 150 ].…”
Section: Open Challenges and Sophisticated-related Issuesmentioning
confidence: 99%
“…Likewise, this open issue lacks studies that attempt to analyze users' sentiments about issues related to the Hajj and Umrah system. Moreover, more research efforts should be made to study the performance [ 147 ], accuracy [ 148 ], and reliability [ 149 ] of sentiment analysis methods and their application to commonly used languages [ 150 ].…”
Section: Open Challenges and Sophisticated-related Issuesmentioning
confidence: 99%
“…This has several application domains in securing bank sensitive accounts and error tracking, voting systems trust, medical agreements, wills and inheritance authentication management [26]. Several security improvements of the secret key have been proposed, modifying the sharing generation process [27][28][29]. The generated share thus obtained, improves the security of access to the system [30,31].…”
Section: Distributed Steganographymentioning
confidence: 99%
“…This technique requires less computation as a strength, however it generates a reduced number of shares. Several optimizations have been made to guarantee the security of shared keys [42] as well as to enhance the number of generated shares [43,44]. These schemes are excellent tools useful for cryptographic protocols.…”
Section: Distributed Steganographymentioning
confidence: 99%