Massoud Hadian Dehkordi
Orcid: 0000-0002-1239-7610
According to our database1,
Massoud Hadian Dehkordi
authored at least 30 papers
between 2008 and 2024.
Collaborative distances:
Collaborative distances:
Timeline
Legend:
Book In proceedings Article PhD thesis Dataset OtherLinks
Online presence:
-
on orcid.org
On csauthors.net:
Bibliography
2024
Wirel. Pers. Commun., July, 2024
Changeable essential threshold secret image sharing scheme with verifiability using bloom filter.
Multim. Tools Appl., June, 2024
LWE-based verifiable essential secret image sharing scheme ( ( t , s , k , n ) $( {t,s,k,n} )$ - VESIS).
IET Image Process., March, 2024
Multim. Tools Appl., February, 2024
High performance image steganography integrating IWT and Hamming code within secret sharing.
IET Image Process., 2024
A verifiable essential secret image sharing scheme based on HLRs (VESIS-(<i>t</i>, <i>s</i>, <i>k</i>, <i>n</i>)).
CAAI Trans. Intell. Technol., 2024
2023
Multim. Tools Appl., 2023
2022
J. Ambient Intell. Humaniz. Comput., 2022
ISC Int. J. Inf. Secur., 2022
2019
Wirel. Pers. Commun., 2019
How to construct a verifiable multi-secret sharing scheme based on graded encoding schemes.
IET Inf. Secur., 2019
A New Variant of the Winternitz One Time Signature Scheme Based on Graded Encoding Schemes.
IACR Cryptol. ePrint Arch., 2019
2018
Efficient multisecret sharing scheme using new proposed computational security model.
Int. J. Commun. Syst., 2018
2017
IEEE J. Biomed. Health Informatics, 2017
Multiple differential-zero correlation linear cryptanalysis of reduced-round CAST-256.
J. Math. Cryptol., 2017
J. Math. Cryptol., 2017
Provably secure verifiable multi-stage secret sharing scheme based on monotone span program.
IET Inf. Secur., 2017
2016
A Lightweight Public Verifiable Multi Secret Sharing Scheme Using Short Integer Solution.
Wirel. Pers. Commun., 2016
2015
Two verifiable multi secret sharing schemes based on nonhomogeneous linear recursion and LFSR public-key cryptosystem.
Inf. Sci., 2015
2014
Secur. Commun. Networks, 2014
2013
Threshold quantum secret sharing between multiparty and multiparty using Greenberger-Horne-Zeilinger state.
Quantum Inf. Process., 2013
J. Math. Cryptol., 2013
Des. Codes Cryptogr., 2013
Adv. Math. Commun., 2013
2011
2009
2008
Comput. Stand. Interfaces, 2008
Verifiable secret sharing schemes based on non-homogeneous linear recursions and elliptic curves.
Comput. Commun., 2008