-
Previous Article
Characterization results on weighted minihypers and on linear codes meeting the Griesmer bound
- AMC Home
- This Issue
- Next Article
How to say yes, no and maybe with visual cryptography
1. | Dept. of Pure Mathematics and Computer Algebra, Ghent University, Krijgslaan 281-S22, 9000 Ghent, Belgium |
[1] |
Bagher Bagherpour, Shahrooz Janbaz, Ali Zaghian. Optimal information ratio of secret sharing schemes on Dutch windmill graphs. Advances in Mathematics of Communications, 2019, 13 (1) : 89-99. doi: 10.3934/amc.2019005 |
[2] |
Stefka Bouyuklieva, Zlatko Varbanov. Some connections between self-dual codes, combinatorial designs and secret sharing schemes. Advances in Mathematics of Communications, 2011, 5 (2) : 191-198. doi: 10.3934/amc.2011.5.191 |
[3] |
Ryutaroh Matsumoto. Strongly secure quantum ramp secret sharing constructed from algebraic curves over finite fields. Advances in Mathematics of Communications, 2019, 13 (1) : 1-10. doi: 10.3934/amc.2019001 |
[4] |
Florian Luca, Igor E. Shparlinski. On finite fields for pairing based cryptography. Advances in Mathematics of Communications, 2007, 1 (3) : 281-286. doi: 10.3934/amc.2007.1.281 |
[5] |
Feng Yang, Kok Lay Teo, Ryan Loxton, Volker Rehbock, Bin Li, Changjun Yu, Leslie Jennings. VISUAL MISER: An efficient user-friendly visual program for solving optimal control problems. Journal of Industrial & Management Optimization, 2016, 12 (2) : 781-810. doi: 10.3934/jimo.2016.12.781 |
[6] |
Diego F. Aranha, Ricardo Dahab, Julio López, Leonardo B. Oliveira. Efficient implementation of elliptic curve cryptography in wireless sensors. Advances in Mathematics of Communications, 2010, 4 (2) : 169-187. doi: 10.3934/amc.2010.4.169 |
[7] |
Gerhard Frey. Relations between arithmetic geometry and public key cryptography. Advances in Mathematics of Communications, 2010, 4 (2) : 281-305. doi: 10.3934/amc.2010.4.281 |
[8] |
Gérard Maze, Chris Monico, Joachim Rosenthal. Public key cryptography based on semigroup actions. Advances in Mathematics of Communications, 2007, 1 (4) : 489-507. doi: 10.3934/amc.2007.1.489 |
[9] |
Jintai Ding, Sihem Mesnager, Lih-Chung Wang. Letters for post-quantum cryptography standard evaluation. Advances in Mathematics of Communications, 2020, 14 (1) : i-i. doi: 10.3934/amc.2020012 |
[10] |
Grégory Faye, Pascal Chossat. A spatialized model of visual texture perception using the structure tensor formalism. Networks & Heterogeneous Media, 2013, 8 (1) : 211-260. doi: 10.3934/nhm.2013.8.211 |
[11] |
Juliang Zhang, Jian Chen. Information sharing in a make-to-stock supply chain. Journal of Industrial & Management Optimization, 2014, 10 (4) : 1169-1189. doi: 10.3934/jimo.2014.10.1169 |
[12] |
Dan Mangoubi. A gradient estimate for harmonic functions sharing the same zeros. Electronic Research Announcements, 2014, 21: 62-71. doi: 10.3934/era.2014.21.62 |
[13] |
Rafael Bravo De La Parra, Luis Sanz. A discrete model of competing species sharing a parasite. Discrete & Continuous Dynamical Systems - B, 2017, 22 (11) : 0-0. doi: 10.3934/dcdsb.2019204 |
[14] |
Lidong Chen, Dustin Moody. New mission and opportunity for mathematics researchers: Cryptography in the quantum era. Advances in Mathematics of Communications, 2020, 14 (1) : 161-169. doi: 10.3934/amc.2020013 |
[15] |
Jong Soo Kim, Won Chan Jeong. A model for buyer and supplier coordination and information sharing in order-up-to systems. Journal of Industrial & Management Optimization, 2012, 8 (4) : 987-1015. doi: 10.3934/jimo.2012.8.987 |
[16] |
João Correia-da-Silva, Joana Pinho. The profit-sharing rule that maximizes sustainability of cartel agreements. Journal of Dynamics & Games, 2016, 3 (2) : 143-151. doi: 10.3934/jdg.2016007 |
[17] |
Adriana Navarro-Ramos, William Olvera-Lopez. A solution for discrete cost sharing problems with non rival consumption. Journal of Dynamics & Games, 2018, 5 (1) : 31-39. doi: 10.3934/jdg.2018004 |
[18] |
Daniele Bartoli, Alexander A. Davydov, Stefano Marcugini, Fernanda Pambianco. A 3-cycle construction of complete arcs sharing $(q+3)/2$ points with a conic. Advances in Mathematics of Communications, 2013, 7 (3) : 319-334. doi: 10.3934/amc.2013.7.319 |
[19] |
Shiyong Li, Wei Sun, Quan-Lin Li. Utility maximization for bandwidth allocation in peer-to-peer file-sharing networks. Journal of Industrial & Management Optimization, 2017, 13 (5) : 1-19. doi: 10.3934/jimo.2018194 |
[20] |
Xue-Yan Wu, Zhi-Ping Fan, Bing-Bing Cao. Cost-sharing strategy for carbon emission reduction and sales effort: A nash game with government subsidy. Journal of Industrial & Management Optimization, 2017, 13 (5) : 1-29. doi: 10.3934/jimo.2019040 |
2018 Impact Factor: 0.879
Tools
Metrics
Other articles
by authors
[Back to Top]