Author:
De Bonis Annalisa,De Santis Alfredo
Subject
General Computer Science,Theoretical Computer Science
Reference33 articles.
1. Visual cryptography for general access structures;Ateniese;Inform. and Comput.,1996
2. G. Ateniese, C. Blundo, A. De Santis, D.R. Stinson, Constructions and bounds for visual cryptography ICALP 1996, Lecture Notes in Computer Science, Vol. 1099, 1996, pp. 416–428.
3. Some recursive constructions for perfect hash families;Atici;J. Combin. Design,1996
4. Universally ideal secret sharing schemes;Beimel;IEEE Trans. Inform. Theory,1994
5. J. Benaloh, J. Leichter, Generalized secret sharing and monotone functions, Proc. Crypto ’88, Advances in Cryptology, Lecture Notes in Computer Science, Vol. 403, 1990, pp. 27–35.
Cited by
22 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Visual Cryptographic Shares Using Color Components;Handbook of Research on Thrust Technologies’ Effect on Image Processing;2023-06-30
2. Image Security Using Visual Cryptography;Advances in Computational Intelligence and Robotics;2022-10-21
3. An overview of visual cryptography techniques;Multimedia Tools and Applications;2021-07-21
4. On the Pixel Expansion of Visual Cryptography Scheme;Cryptography;2020
5. Improved Contrast for Threshold Random-grid-based Visual Cryptography;KSII Transactions on Internet and Information Systems;2018-07-31