Subject
Artificial Intelligence,Information Systems and Management,Computer Science Applications,Theoretical Computer Science,Control and Systems Engineering,Software
Reference10 articles.
1. A modular approach to key safeguarding;Asmuth;IEEE Trans. Inf. Theory,1983
2. Compact sequences of co-primes and their applications to the security of CRT-based threshold schemes;Barzu;Inf. Sci. (Ny),2013
3. Elements of Information Theory;Cover,2006
4. Chinese Remainder Theorem. Applications in Computing, Coding, Cryptography;Ding,1996
5. Distributive weighted threshold secret sharing schemes;Drăgan;Inf. Sci. (Ny),2016
Cited by
11 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献