Author:
Blundo C.,De Santis A.,Gargano L.,Vaccaro U.
Publisher
Springer Berlin Heidelberg
Reference22 articles.
1. Lect Notes Comput Sci;J. C. Benaloh,1988
2. G. R. Blakley, Safeguarding Cryptographic Keys, Proceedings AFIPS 1979 National Computer Conference, pp.313–317, June 1979.
3. C. Blundo Secret Sharing Schemes for Access Structures based on Graphs, Tesi di Laurea, University of Salerno, Italy, 1991, (in Italian).
4. C. Blundo, A. De Santis, D. R. Stinson, and U. Vaccaro, Graph Decomposition and Secret Sharing Schemes, Eurocrypt 1992, Hungary.
5. E. F. Brickell and D. M. Davenport, On the classification of ideal secret sharing schemes, J. Cryptology, 4:123–134, 1991.
Cited by
31 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献