-
1
-
-
0002015048
-
Visual cryptography for general access structures
-
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R., 1996a. Visual cryptography for general access structures. Informat. Computat. 129, 86-106.
-
(1996)
Informat. Computat.
, vol.129
, pp. 86-106
-
-
Ateniese, G.1
Blundo, C.2
De Santis, A.3
Stinson, D.R.4
-
2
-
-
84947751790
-
Constructions and bounds for visual cryptography
-
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R., 1996b. Constructions and bounds for visual cryptography. In: 23rd Internat. Colloquium on Automata, Languages and Programming Lecture Notes in Computer Science, vol. 1099, pp. 416-428.
-
(1996)
23rd Internat. Colloquium on Automata, Languages and Programming Lecture Notes in Computer Science
, vol.1099
, pp. 416-428
-
-
Ateniese, G.1
Blundo, C.2
De Santis, A.3
Stinson, D.R.4
-
3
-
-
0004026002
-
-
Morgan Kaufmann Publishers, San Francisco
-
Cox, I., Miller, M., Bloom, J., 2001. Digital Watermarking. Morgan Kaufmann Publishers, San Francisco.
-
(2001)
Digital Watermarking
-
-
Cox, I.1
Miller, M.2
Bloom, J.3
-
4
-
-
84944046626
-
Randomness in visual cryptography
-
Springer-Verlag
-
De Bonis, A., De Santis, A., 2000. Randomness in visual cryptography. In: Proc. STACS 2000 LNCS 1770. Springer-Verlag, pp. 627-638.
-
(2000)
Proc. STACS 2000 LNCS 1770
, pp. 627-638
-
-
De Bonis, A.1
De Santis, A.2
-
5
-
-
84955572416
-
New results on visual cryptography
-
Springer-Verlag, Berlin
-
Droste, S., 1996. New results on visual cryptography. In: Adv. Cryptol. CRYPTO'96 LNCS 1109. Springer-Verlag, Berlin, pp. 401-415.
-
(1996)
Adv. Cryptol. CRYPTO'96 LNCS 1109
, pp. 401-415
-
-
Droste, S.1
-
6
-
-
84947730729
-
Contrast-optimal k out of n secret sharing schemes in visual cryptography
-
Springer-Verlag
-
Hofmeister, T., Krause, M., Simon, H.U., 1997. Contrast-optimal k out of n secret sharing schemes in visual cryptography. In: COCOON'97 LNCS 1276. Springer-Verlag, pp. 176-185.
-
(1997)
COCOON'97 LNCS 1276
, pp. 176-185
-
-
Hofmeister, T.1
Krause, M.2
Simon, H.U.3
-
7
-
-
0003482562
-
-
Kluwer Academic Publishers, Dordrecht
-
Johnson, N.F., Duric, Z., Jajodia, S., 2000. Information Hiding: Steganography and Watermarking-Attackers and Countermeasures. Kluwer Academic Publishers, Dordrecht.
-
(2000)
Information Hiding: Steganography and Watermarking - Attackers and Countermeasures
-
-
Johnson, N.F.1
Duric, Z.2
Jajodia, S.3
-
8
-
-
84926193517
-
Visual cryptography
-
Naor, M., Shamir, A., 1995. Visual cryptography. In: Advances in Cryptology-EUROCRYPT'94 Lecture Notes in Computer Science, vol. 950, pp. 1-12.
-
(1995)
Advances in Cryptology - EUROCRYPT'94 Lecture Notes in Computer Science
, vol.950
, pp. 1-12
-
-
Naor, M.1
Shamir, A.2
-
9
-
-
84958648410
-
Visual authentication and identification
-
Naor, M., Pinkas, B., 1997. Visual authentication and identification. In: Advances in Cryptology-CRYPTO'97 Lecture Notes in Computer Science, vol. 1294, pp. 322-336.
-
(1997)
Advances in Cryptology - CRYPTO'97 Lecture Notes in Computer Science
, vol.1294
, pp. 322-336
-
-
Naor, M.1
Pinkas, B.2
-
12
-
-
0000049121
-
Construction and properties of k out of n visual secret sharing schemes
-
Verheul, E.R., van Tilborg, H.C.A., 1997. Construction and Properties of k out of n visual secret sharing schemes. Designs Codes Cryptogr. 11, 179-196.
-
(1997)
Designs Codes Cryptogr.
, vol.11
, pp. 179-196
-
-
Verheul, E.R.1
van Tilborg, H.C.A.2
-
13
-
-
0032121005
-
Space-filling curve ordered dither
-
Zhang, Y., 1998. Space-filling curve ordered dither. Comput. Graphics 22 (4), 559-563.
-
(1998)
Comput. Graphics
, vol.22
, Issue.4
, pp. 559-563
-
-
Zhang, Y.1
|