Author:
Yang Yu-Guang,Teng Yi-Wei,Chai Hai-Ping,Wen Qiao-Yan
Publisher
Springer Science and Business Media LLC
Subject
Physics and Astronomy (miscellaneous),General Mathematics
Reference41 articles.
1. Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)
2. Blakley, G.R.: Safeguarding cryptographic keys. In: Proceedings of National Computer Conference, pp. 313–317. AFIPS, New York (1979)
3. Asmuth, C., Blakley, G.: Pooling, Splitting and reconstituting information to overcome total failure of some channels of communication. In: Proceedings of the 1982 Symposium on Security and Privacy, pp. 156–169. IEEE Press, New York (1982)
4. Asmuth, C., Bloom, J.: A modular approach to key safeguarding. IEEE Trans. Inf. Theory 29, 208–210 (1983)
5. Knarnin, E., Greene, J., Hellman, M.: On secret sharing systems. IEEE Trans. Inf. Theory 29, 35–41 (1983)
Cited by
54 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献