-
1
-
-
0002015048
-
-
G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, Visual Cryptography for General Access Structures, Information and Computation, 129 (1996), 86-106.
-
C. Blundo, A. de Santis, and D. R. Stinson, Visual Cryptography for General Access Structures, Information and Computation, 129 (1996), 86-106.
-
-
Ateniese, G.1
-
2
-
-
84947751790
-
-
F. M. auf der Heide and B. Monien, Eds., 1099 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, pp. 416-428. 1996.
-
G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, Constructions and Bounds for Visual Cryptography, in Proceedings of the 23rd International Colloquium on Automata, Languages and Programming (ICALP '96), F. M. auf der Heide and B. Monien, Eds., 1099 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, pp. 416-428. 1996.
-
C. Blundo, A. de Santis, and D. R. Stinson, Constructions and Bounds for Visual Cryptography, in Proceedings of the 23rd International Colloquium on Automata, Languages and Programming (ICALP '96)
-
-
Ateniese, G.1
-
4
-
-
85034516820
-
-
Th. Belh, D. Jungnickel and H. Lenz, Design Tlieory, Bibliographisches Institut, Mannheim, 1985.
-
D. Jungnickel and H. Lenz, Design Tlieory, Bibliographisches Institut, Mannheim, 1985.
-
-
Belh, T.1
-
5
-
-
85034489820
-
-
C. Blundo, P. D'Arco, A. De Santis, and D. R. Stinson, Contrast Optimal Threshold Visual Cryptography Schemes, submitted for publication, 1998.
-
P. D'Arco, A. de Santis, and D. R. Stinson, Contrast Optimal Threshold Visual Cryptography Schemes, Submitted for Publication, 1998.
-
-
Blundo, C.1
-
6
-
-
0025519305
-
-
A. E. Brouwer, J. B. Shearer, N. J. A. Sloane, and \V. D. Smith, A New Table of Constant Weight Codes, IEEE Transactions on Information Tlieory 36 (1983), 1334-1380.
-
J. B. Shearer, N. J. A. Sloane, and \V. D. Smith, A New Table of Constant Weight Codes, IEEE Transactions on Information Tlieory 36 (1983), 1334-1380.
-
-
Brouwer, A.E.1
-
8
-
-
85034489999
-
-
C. J. Colboum and J. H. Dinitz, CRC Handbook of Combinatorial Designs, CRC Press, Boca Raton, FL, 1996.
-
CRC Handbook of Combinatorial Designs, CRC Press, Boca Raton, FL, 1996.
-
-
Colboum, C.J.1
Dinitz, J.H.2
-
9
-
-
84955572416
-
-
1109 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, pp. 401-415,1996.
-
S. Droste, New Results on Visual Cryptography, in Advances in Cryplology-CRYPTO '96, N. Koblitz, Ed., 1109 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, pp. 401-415,1996.
-
New Results on Visual Cryptography, in Advances in Cryplology-CRYPTO '96, N. Koblitz, Ed.
-
-
Droste, S.1
-
10
-
-
85034507748
-
-
1276 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1997.
-
T. Hofmeister, M. Krause, and H. U. Simon, Contrast-Optimal k out of Secret Sharing Schemes in Visual Cryptography, in COCOON '97, T. Jiang and D. T. Lee, Eds., 1276 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, 1997.
-
M. Krause, and H. U. Simon, Contrast-Optimal K out Of Secret Sharing Schemes in Visual Cryptography, in COCOON '97, T. Jiang and D. T. Lee, Eds.
-
-
Hofmeister, T.1
-
14
-
-
84958648410
-
-
1294 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, pp. 322-336,1997.
-
M. Naor and B. Pinkas, Visual Authentication and Identification, in Advances in Cryplology-CRYPTO '97, B. Kaliski, Jr., Ed., 1294 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, pp. 322-336,1997.
-
Visual Authentication and Identification, in Advances in Cryplology-CRYPTO '97, B. Kaliski, Jr., Ed.
-
-
Naor, M.1
Pinkas, B.2
-
15
-
-
84926193517
-
-
950 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, pp. 1-12, 1995.
-
M. Naor and A. Shamir, Visual Cryptography, in Advances in Cryplology-EUROCRYPT '94, A. De Santis, Ed., 950 of Lecture Notes in Computer Science, Springer-Verlag, Berlin, pp. 1-12, 1995.
-
Visual Cryptography, in Advances in Cryplology-EUROCRYPT '94, A. de Santis, Ed.
-
-
Naor, M.1
Shamir, A.2
-
16
-
-
85034488549
-
-
1996. Available as http://www.unisa.it/SCN96/papers/NaSh.ps.
-
M. Naor and A. Shamir, Visual Cryptography II: Improving the Contrast via the Cover Base, presented at Security in Communication Networks, Amalfi, Italy, September 16-17, 1996. Available as http://www.unisa.it/SCN96/papers/NaSh.ps.
-
Visual Cryptography II: Improving the Contrast Via the Cover Base, Presented at Security in Communication Networks, Amalfi, Italy, September 16-17
-
-
Naor, M.1
Shamir, A.2
|