Publisher
Springer Berlin Heidelberg
Reference2 articles.
1. Hirt M, Maurer U (2000) Player simulation and general adversary structures in perfect multiparty computation. J Cryptol 13(1):31–60
2. Ito M, Saito A, Nishizeki TT (1987) Secret sharing schemes realizing general access structures. In: Proceedings of IEEE Global Telecommunications Conference, Globecom’87, IEEE Communications Society Press, pp 99–102