Publisher
Springer Science and Business Media LLC
Reference66 articles.
1. Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
2. Sahu, A.K.; Swain, G.: Dual stego-imaging based reversible data hiding using improved LSB matching. Int. J. Intell. Eng. Syst. 12, 63–74 (2019)
3. Blakley, G.R.: Safeguarding cryptographic keys. In: Afips, p. 313 (1979)
4. Ito, M.; Saito, A.; Nishizeki, T.: Secret sharing scheme realizing general access structure. Electron. Commun. Jpn. (Part III Fundam. Electron. Sci.) 72(9), 56–64 (1989)
5. Beimel, A.: Secret-sharing schemes: a survey. Lecture Notes in Computer Science (Including Subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), vol. 6639 LNCS, pp. 11–46 (2011)
Cited by
27 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献