Author:
Narad Supriya,Chavan Pallavi
Reference14 articles.
1. Lein Harn.Group authentication.IEEE Transactions on computers, vol. 62, no. 9;September 2013.
2. Sian-Jheng Lin and Wei-Ho Chung.A probabilistic model of (t, n) visual cryptography scheme with dynamic group.IEEE Transactions on. Information Forensics and Security, vol. 7, No. 1;February 2012.
3. Ilker Nadi Bozkurt, Kamer Kaya and Ali Aydın Selcuk.Threshold cryptography based on blakley's secret sharing.IEEE Transactions, vol. 22, pp: 612-613;January 2011.
4. Mitsugu Iwamoto.A weak security notion for visual secret sharing scheme.IEEE Transactions on Information Forensics and Security, vol. 7, No. 2;April 2012.
5. Marin Bertier.Low cost secret sharing in sensor networks.IEEE Symposium on High Assuarance Systems Engineering;March 2010.
Cited by
16 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献