Author:
Zhao Jinghui,Shan Xiuling,Tian Zihong
Funder
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Applied Mathematics,Computational Theory and Mathematics,Computer Networks and Communications
Reference23 articles.
1. Benaloh, J., Leichter, J.: Generalized secret sharing and monotone functions. In: Advances in Cryptology: Proceedings of CRYPTO’88. Lecture Notes in Comput. Sci., vol. 403. pp. 27–35 (1990)
2. Blakley, G.R.: Safeguarding cryptographic keys. Proceedings of the AFIPS 1979 National Computer Conference, New York, 313–317 (1979)
3. Blakley, G.R., Meadows, C.: Security of ramp schemes. In: Advances in Cryptology: Proceedings of CRYPTO’84. Lecture Notes in Comput. Sci., vol. 196. pp. 242–268 (1985)
4. Brouwer, A.E.: Steiner triple systems without forbidden subconfigurations. Technical Report ZW 104/77. Mathematisch Centrum, Amsterdam (1977)
5. Chee, Y.M., Colbourn, C.J., Ling, A.C.H.: Asymptotically optimal erasure-resilient codes for large disk arrays. Discrete Appl. Math. 102, 3–36 (2002)