1. Temporal integration based visual cryptography scheme and its application;Wang,2017
2. Highly-efficient and composable password-protected secret sharing (or: how to protect your bitcoin wallet online);Jarecki,2016
3. Signature based authentication using contrast enhanced hierarchical visual cryptography;Chavan,2014
4. Access control and signatures via quorum secret sharing;Naor;ACM,1996
5. Exploiting the homomorphic property of visual cryptography;Yan;Int. J. Digital CrimeForensics (IJDCF),2017