Author:
Jisha T. E.,Monoth Thomas
Reference21 articles.
1. Naor, M., Shamir, A.: Visual Cryptography. Advances in Cryptology-Eurocrypt’94, LNCS 950, pp. 1–12 (1995)
2. Pandey, D., Kumar, A., Singh, Y.: Feature and Future of Visual Cryptography Based Schemes, Quality, Reliability, Security and Robustness in Heterogeneous Networks, Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, vol. 115, pp. 816–830. Springer (2013).
https://doi.org/10.1007/978-3-642-37949-9_71
3. Monoth, T., Babu Anto, P.: Analysis and Design of Tamperproof and Contrast-Enhanced Secret Sharing Based on Visual Cryptography Schemes, Ph.D. thesis, Kannur University, Kerala, India (2012).
http://shodhganga.inflibnet.ac.in
4. Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Constructions and bounds for visual cryptography. In: Meyer, F., Monien, B. (eds.) Automata, Languages and Programming. ICALP 1996. Lecture Notes in Computer Science, Vol. 1099. Springer, Berlin (1996)
5. Weir, J., Yan, W.A.: Comprehensive study of visual cryptography. In: Shi, Y.Q. (eds.) Transactions on Data Hiding and Multimedia Security V. Lecture Notes in Computer Science, vol. 6010. Springer, Berlin (2010)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献