Author:
Ateniese Giuseppe,Blundo Carlo,Santis Alfrede,Stinson Douglas R.
Publisher
Springer Berlin Heidelberg
Reference11 articles.
1. G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, Visual Cryptography for General Access Structures. Available from ECCC, Electronic Colloquium on Computational Complexity (TR96-012), via WWW using http://www.eccc.uni-trier.de/eccc/.
2. G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, Extended Schemes for Visual Cryptography, preprint, 1995.
3. M. Atici, S. S. Magliveras, D. R. Stinson, and W.-D. Wei, Some Recursive Constructions for Perfect Hash Families, Technical Report UNL, Univ. of NebraskaLincoln, June 1995.
4. C. Blundo, A. De Santis, D. R. Stinson, and U. Vaccaro, Graph Decomposition and Secret Sharing Schemes, Journal of Cryptology, Vol. 8, (1995), pp. 39–64.
5. M. L. Fredman and J. Komlós, On the Size of Separating System and Families of Perfect Hash Functions, SIAM J. Alg. Disc. Meth., Vol 5, No 1, March 1984.
Cited by
43 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献