Author:
Laih Chi-Sung,Harn Lein,Lee Jau-Yien,Hwang Tzonelih
Reference10 articles.
1. D.E.R. Denning, Cryptography and Data Security, (Addison-Wesley Reading Mass., 1982.
2. G.R. Blakley, Safeguarding crytographic keys, Proc. NCC, Vol.48, AFIPS Press, Montvale, N.J., 1979, pp. 313–317.
3. A. Shamir, How to share a secret, Comm. ACM, vol.22, no.11, 1979, pp.612–613.
4. G.I. Davida, R.A. Demillo and R.J. Liption, “Protecting shared cryptographic keys,” Proc. Symp. on security and privacy, IEEE computer society, 1980, pp.100–102.
5. D.E. Denning and F.B. Schneider, “Master keys for group sharing,” Information Processing Letters, vol.12, no.l, pp.23–25, 1981.
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献