Author:
Atrey Pradeep K.,Alharthi Saeed,Hossain M. Anwar,AlGhamdi Abdullah,El Saadik Abdulmotaleb
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference27 articles.
1. Alharthi S, Atrey PK (2010) Further improvements on secret image sharing scheme. In: MiFor’10: Proc. of the ACM multimedia workshop on multimedia in forensics, security and intelligence. Firenze, Italy, pp 53–58
2. Alharthi S, Atrey PK, Kankanhalli MS (2010) Secret video sharing. In: Proc. of the APSIPA annual summit and conference 2010 (APSIPA-ASC 2010). Singapore
3. Atrey PK, Hildebrand K, Ramanna S (2011) An efficient method for protection of text documents using secret sharing. In: Proc. of the international conference on frontiers of computer science. Bangalore, India
4. Bai L (2006) A reliable (k, n) image secret sharing scheme. In: Proc. of the 2nd IEEE international symposium on dependable, autonomic and secure computing, DASC ’06. Indianapolis, USA, pp 31–36
5. Cramer R, Damgrd I, Maurer U (2000) General secure multi-party computation from any linear secret-sharing scheme. In: LNCS Advances in Cryptology—EUROCRYPT. Springer-Verlag, pp 316–334
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献