Author:
Brickell E. F.,Stinson D. R.
Reference9 articles.
1. Lect Notes Comput Sci;J. C. Benaloh,1987
2. G. R. Blakley, Safeguarding cryptographic keys, Proc. N. C. C., vol. 48, AFIPS Conference Proceedings 48 (1979), 313–317.
3. David Chaum, personal communication.
4. David Chaum, Claude Crepeau and Ivan Damgard, Multiparty unconditionally secure protocols, to appear in Proceedings of the 20th ACM Symposium on the Theory of Computing, 1988.
5. B. Chor, S. Goldwasser, S. Micali and B. Awerbuch, Verifiable secret sharing and achieving simultaneity in the presence of faults, Proc. 26th IEEE Symp. on Foundations of Computer Science, 1985, 383–395.
Cited by
20 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献