Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Media Technology,Software
Reference55 articles.
1. Adi S (1979) How to share a secret. Commun ACM 22(11):612–613
2. Ahmadian AM, Amirmazlaghani M (2019) A novel secret image sharing with steganography scheme utilizing optimal asymmetric encryption padding and information dispersal algorithms. Signal Processing, Image Communication 74:78–88
3. Anonymized (2016) Poster: a keyless efficient algorithm for data protection by means of fragmentation. In: Proceedings of the 2016 ACM SIGSAC conference on computer and communications security, CCS’16. ACM, New York, pp 1745–1747
4. Bao L, Yi S, Zhou Y (2017) Combination of sharing matrix and image encryption for lossless (k,n)-secret image sharing. IEEE Trans Image Process 26(12):5618–5631
5. Barker EB, Kelsey JM (2011) Recommendation for random number generation using deterministic random bit generators (revised). US Department of Commerce, Technology Administration, National Institute of Standards and Technology, Computer Security Division, Information Technology Laboratory
Cited by
4 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献