Author:
Stinson D.R.,van Trung Tran,Wei R.
Subject
Applied Mathematics,Statistics, Probability and Uncertainty,Statistics and Probability
Reference35 articles.
1. Alon, N., Spencer, J.H., 1992. The Probabilistic Method. Wiley, New York.
2. Some recursive constructions for perfect hash families;Atici;J. Combin. Des.,1996
3. Biehl, I., Meyer, B., 1997. Protocols for collusion-secure asymmetric fingerprinting. 14th Symposium on Theoretical Aspects of Computing. Lecture Notes in Computer Science, Vol. 1200, Springer, Berlin, pp. 399–412.
4. Blackburn, S., 1999. Combinatorics and threshold cryptography. In Combinatorial Designs and their Applications, Chapman and Hall Research Notes in Mathematics, Vol. 403, pp. 49–70.
5. Blackburn, S., Burmester, M., Desmedt, Y., Wild, P.R., 1996. Efficient multiplicative sharing schemes. Advances in Cryptology — Eurocrypt ’96. Lecture Notes in Computer Science, Vol. 1070. Springer, Berlin, pp. 107–118.
Cited by
141 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献