Publisher
Springer International Publishing
Reference20 articles.
1. Tieng, D.G., Nocon, E.: Some attacks on Shami’s secret sharing scheme by inside adversaries (2016)
2. Narani, S.: Social secret sharing for resource management in cloud. arXiv preprint arXiv:1302.1185 (2013)
3. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
4. Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of the National Computer Conference, vol. 48, no. 313 (1979)
5. Dawson, E., Donovan, D.: The breadth of Shamir’s secret-sharing scheme. Comput. Secur. 13(1), 69–78 (1994)