Author:
Chang Chin-Chen,Huynh Ngoc-Tu,Le Hai-Duong
Subject
Electrical and Electronic Engineering,Computer Vision and Pattern Recognition,Signal Processing,Software,Control and Systems Engineering
Reference21 articles.
1. How to share a secret;Shamir;Commun. Assoc. Comput. Mach.,1979
2. G.R. Blakley, Safeguarding cryptographic key, in: Proceedings of the National Computer Conference, American Federation of Information Processing Societies Proceedings, vol. 48, 1979, pp. 313–317.
3. Generalized secret sharing and monotone functions;Benaloh,1989
4. C. Blundo, A. De Santis, U. Vaccaro, Efficient sharing of many secrets, in: Proceedings of Symposium on Theoretical Aspects of Computer Science (STACS’93), Lecture Notes in Computer Science, Springer, Berlin, vol. 665, 1993, pp. 692–703.
5. Multi-secret sharing schemes;Blundo,1994
Cited by
26 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献