-
1
-
-
84947751790
-
Constructions and bounds for visual cryptography
-
"23rd International Colloquium on Automata, Languages and Programming" (ICALP '96), (F. M. auf der Heide and B. Monien, Eds.), Springer-Verlag, Berlin
-
Ateniese, G., Blundo, C., De Santis, A., and Stinson, D. R. (1996), Constructions and bounds for visual cryptography, in "23rd International Colloquium on Automata, Languages and Programming" (ICALP '96), (F. M. auf der Heide and B. Monien, Eds.), Lecture Notes in Computer Science, Vol. 1099, pp. 416-428, Springer-Verlag, Berlin.
-
(1996)
Lecture Notes in Computer Science
, vol.1099
, pp. 416-428
-
-
Ateniese, G.1
Blundo, C.2
De Santis, A.3
Stinson, D.R.4
-
2
-
-
0000437895
-
-
preprint
-
Blundo, C., De Santis, A., and Stinson, D. R. (1996), On the contrast in visual cryptography schemes, preprint.
-
(1996)
On the Contrast in Visual Cryptography Schemes
-
-
Blundo, C.1
De Santis, A.2
Stinson, D.R.3
-
3
-
-
0034899594
-
-
preprint
-
Ateniese, G., Blundo, C., De Santis, A., and Stinson, D. R. (1995), Extended schemes for visual cryptography, preprint.
-
(1995)
Extended Schemes for Visual Cryptography
-
-
Ateniese, G.1
Blundo, C.2
De Santis, A.3
Stinson, D.R.4
-
4
-
-
85030011298
-
Some recursive constructions for perfect fash families
-
to appear
-
Atici, M., Magliveras, S. S., and Stinson, D. R., and Wei, W.-D. Wei, Some recursive constructions for perfect fash families, in J. Combin. Designs, to appear.
-
J. Combin. Designs
-
-
Atici, M.1
Magliveras, S.S.2
Stinson, D.R.3
Wei, W.-D.W.4
-
5
-
-
0029631974
-
Graph decomposition and secret sharing schemes
-
Bludno, C., De Santis, A., Stinson, D. R., and Vaccaro, U. (1995), Graph decomposition and secret sharing schemes, J. Cryptol. 8, 39-64.
-
(1995)
J. Cryptol.
, vol.8
, pp. 39-64
-
-
Bludno, C.1
De Santis, A.2
Stinson, D.R.3
Vaccaro, U.4
-
6
-
-
0026992660
-
Some improved bounds on the information rate of perfect secret sharing schemes
-
Brickell, E. F., and Stinson, D. R. (1992), Some improved bounds on the information rate of perfect secret sharing schemes, J. Cryptol. 5, 153-166.
-
(1992)
J. Cryptol.
, vol.5
, pp. 153-166
-
-
Brickell, E.F.1
Stinson, D.R.2
-
7
-
-
51249175955
-
Families of finite sets in which no set is covered by the union r others
-
Erdös, P., Frankl, P., and Füredi, Z. (1985), Families of finite sets in which no set is covered by the union r others, Israel J. Math. 51, 79-89.
-
(1985)
Israel J. Math.
, vol.51
, pp. 79-89
-
-
Erdös, P.1
Frankl, P.2
Füredi, Z.3
-
8
-
-
0002302934
-
On the size of separating system and famolies of perfect hash functions
-
Fredman, M. L., and J. Komlós, (1984), On the size of separating system and famolies of perfect hash functions, SIAM J. Algebraic Discrete Methods 5, No. 1.
-
(1984)
SIAM J. Algebraic Discrete Methods
, vol.5
, Issue.1
-
-
Fredman, M.L.1
Komlós, J.2
-
9
-
-
0346866648
-
-
Cambridge Univ. Press, Cambridge, UK
-
van Lint, J. H., and Wilson, R. M., (1992), Cambridge Univ. Press, Cambridge, UK.
-
(1992)
-
-
Van Lint, J.H.1
Wilson, R.M.2
-
11
-
-
84926193517
-
Visual cryptography
-
"Advances in Cryptogoly - Eurocrypt '94" (A. De Santis, Ed.), Springer-Verlag, Berlin
-
Naor, M., and Shamir, A. (1995), Visual cryptography, in "Advances in Cryptogoly - Eurocrypt '94" (A. De Santis, Ed.), Lecture Notes in Computer Science, Vol. 950, pp. 1-12, Springer-Verlag, Berlin.
-
(1995)
Lecture Notes in Computer Science
, vol.950
, pp. 1-12
-
-
Naor, M.1
Shamir, A.2
-
12
-
-
0024079508
-
Zero error capacity under list decoding
-
Elias, P. (1988), Zero error capacity under list decoding, IEEE Trans. Inform. Theory, 34, No. 5, 1070-1074.
-
(1988)
IEEE Trans. Inform. Theory
, vol.34
, Issue.5
, pp. 1070-1074
-
-
Elias, P.1
-
13
-
-
0003128147
-
The geometry of shared secret schemes
-
Simmons, G. J., Jackson, W., and Martin, K. (1991), The geometry of shared secret schemes, Bull. ICA, 1, 71-88.
-
(1991)
Bull. ICA
, vol.1
, pp. 71-88
-
-
Simmons, G.J.1
Jackson, W.2
Martin, K.3
-
14
-
-
0028323999
-
Decomposition constructions for secret sharing schemes
-
Stinson, D. R. (1994), Decomposition constructions for secret sharing schemes, IEEE Trans. Inform. Theory, 40, No. 1, 118-125.
-
(1994)
IEEE Trans. Inform. Theory
, vol.40
, Issue.1
, pp. 118-125
-
-
Stinson, D.R.1
|