Author:
Pandey Dhiraj,Kumar Anil,Singh Yudhvir
Publisher
Springer Berlin Heidelberg
Reference50 articles.
1. Shamir, A.: How to share a secret. Communications of the ACM 22(11), 612–613 (1979)
2. Lecture Notes in Computer Science;M. Naor,1995
3. Blundo, C., D’Arco, P., De Santis, A., Stinson, D.R.: Contrast optimal threshold visual cryptography schemes. SIAM Journal on Discrete Mathematics 16(2), 224–261 (2003)
4. Lau, D.L., Arce, G.R.: Modern Digital Halftoning. Marcel Dekker, New York (2000)
5. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Extended schemes for visual cryptography. Theoretical Computer Science 250, 1–16 (1996)
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献