Subject
Applied Mathematics,General Engineering,Algebra and Number Theory,Theoretical Computer Science
Reference11 articles.
1. G.R. Blakley, Safeguarding cryptographic keys, in: Proc. International Workshop on Managing Requirements Knowledge, 1979, p. 313.
2. Some ideal secret sharing schemes;Brickell,1990
3. Representation Theory: A First Course;Fulton,1991
4. Several generalizations of Shamir's secret sharing scheme;Lai;Int. J. Found. Comput. Sci.,2004
5. A Treatise on the Theory of Determinants;Muir,1933