Author:
Kumar Ramakant,Padhye Sahadeo
Publisher
Springer Nature Singapore
Reference32 articles.
1. Chunying W, Shundong L, Yiying Z (2013) Key management scheme based on secret sharing for wireless sensor network. In: Fourth international conference on emerging intelligent data and web technologies (EIDWT), pp 574–578
2. Attasena V, Harbi N, Darmont J et al (2013) Sharing-based privacy and availability of cloud data warehouse, 9’emes journees francophones sur les Entrepots de Donnees et lAnalyse en ligne (EDA 2013), pp 17–32
3. Schoenmakers B (1999) A simple publicly verifiable secret sharing scheme and its application to electronic voting. In: Advances in CryptologyCRYPTO99. Springer, pp 148–164
4. Stadler M (1996) Publicly verifiable secret sharing. In: Maurer U (ed) Advances in cryptology EUROCRYPT 96. Lecture notes in computer science, vol 1070. Springer, Berlin, pp 190–199
5. Cramer R, Damgard I, Maurer U (2000) General secure multi-party computation from any linear secret-sharing scheme. In: Preneel B