Author:
Martin K. M.,Safavi-Naini R.
Publisher
Springer Berlin Heidelberg
Reference25 articles.
1. J. Benaloh and J. Leichter, Generalised secret sharing schemes and monotone functions, Adv. in Cryptology — CRYPTO '88, Lecture Notes in Compt. Sci., 403, (1990), 27–35.
2. B. Blakley and G.R. Blakley and A.H. Chan and J.L. Massey, Threshold Schemes With Disenrollment, Adv. in Cryptology — CRYPTO'92, Lecture Notes in Comput. Sci., 740, (1993), 540–548.
3. G.R. Blakley and G.A. Kabatianski, Linear algebra approach to secret sharing schemes, Adv. in Cryptology — CRYPTO '95, Lecture Notes in Comput. Sci., 963, (1995), 367–371.
4. B. den Boer, A simple and key-economical unconditional authentication scheme, J. of Computer Security, 2, (1993), 65–71.
5. E.F. Brickell, Some ideal secret sharing schemes, J. Combin. Math Combin. Comput., 6, (1989), 105–113.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献