Author:
Liu Feng,Wu Chuan Kun,Lin Xi Jun
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computer Science Applications
Reference13 articles.
1. Ateniese G., Blundo C., Santis A.D., Stinson D.R.: Visual cryptography for general access structures. Inform. Computat. 129, 86–106 (1996)
2. Ateniese G., Blundo C., Santis A.D., Stinson D.R.: Extended capabilities for visual cryptography. ACM Theor. Comput. Sci. 250(1–2), 143–161 (2001)
3. Biham E., Itzkovitz A.: Visual cryptography with polarization. In: The Dagstuhl Seminar on Cryptography, September 1997, and in the RUMP session of CRYPTO ’98 (1997).
4. Cimato S., Prisco R.D., Santis A.D.: Probabilistic visual cryptography schemes. Comput. J. 49(1), 97–107 (2006)
5. Droste S.: New results on visual cryptography. In: CRYPTO ’96. LNCS, vol. 1109, pp. 401–415. Springer-Verlag (1996).
Cited by
36 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献