-
1
-
-
85062838317
-
-
Proc. AFIPS 1979 Natl. Conf. New York
-
G. Blakley, Safeguarding Cryptographic Keys, Proc. AFIPS 1979 Natl. Conf. New York, Vol. 48 (1979) pp. 313-317.
-
(1979)
Safeguarding Cryptographic Keys
, vol.48
, pp. 313-317
-
-
Blakley, G.1
-
2
-
-
0005167951
-
The detection of cheaters in threshold schemes
-
E. F. Brickell and D. R. Stinson, The detection of cheaters in threshold schemes, SIAM J. Disc. Math., Vol. 4 (1991) pp. 502-510.
-
(1991)
SIAM J. Disc. Math.
, vol.4
, pp. 502-510
-
-
Brickell, E.F.1
Stinson, D.R.2
-
3
-
-
0001476931
-
A perfect threshold secret sharing scheme to identify cheaters
-
M. Carpenteri, A perfect threshold secret sharing scheme to identify cheaters, Des. Codes Cryptogr., Vol. 5 (1995) pp. 183-187.
-
(1995)
Des. Codes Cryptogr.
, vol.5
, pp. 183-187
-
-
Carpenteri, M.1
-
4
-
-
0036605019
-
An image intellectual property protection scheme for gray-level image using visual secret sharing strategy
-
C. C. Chang and J. C. Chuang, An image intellectual property protection scheme for gray-level image using visual secret sharing strategy, Pattern Recogn. Lett., Vol. 23 (2002) pp. 931-941.
-
(2002)
Pattern Recogn. Lett.
, vol.23
, pp. 931-941
-
-
Chang, C.C.1
Chuang, J.C.2
-
5
-
-
0030676509
-
Efficient cheater identification method for threshold schemes
-
C. C. Chang and R. J. Hwang, Efficient cheater identification method for threshold schemes, IEE Proc.-Comput. Digit. Technol., Vol. 144 (1997), pp. 23-27.
-
(1997)
IEE Proc.-Comput. Digit. Technol.
, vol.144
, pp. 23-27
-
-
Chang, C.C.1
Hwang, R.J.2
-
6
-
-
30744441498
-
-
http://www.cacr.math.uwaterloo.ca/~dstinson
-
-
-
-
7
-
-
84958648410
-
Visual authentication and identification
-
Burton S. Kaliski Jr. (ed.), Lecture Notes in Computer Science, Springer-Verlag, New York
-
M. Naor and B. Pinkas, Visual Authentication and Identification, In Burton S. Kaliski Jr. (ed.), Advances in Cryptology - Proceedings of Crypto 97, Lecture Notes in Computer Science, Springer-Verlag, New York, 1294 (1997) pp. 322-336.
-
(1997)
Advances in Cryptology - Proceedings of Crypto 97
, vol.1294
, pp. 322-336
-
-
Naor, M.1
Pinkas, B.2
-
8
-
-
84926193517
-
Visual cryptography
-
Alfredo De Santis (ed.), Lecture Notes in Computer Science, Springer-Verlag, New York
-
M. Naor and A. Shamir, Visual cryptography, In Alfredo De Santis (ed.), Advances in Cryptology - Proceedings of Eurocypto 94, Lecture Notes in Computer Science, Springer-Verlag, New York, 950 (1995) pp. 1-12.
-
(1995)
Advances in Cryptology - Proceedings of Eurocypto 94
, vol.950
, pp. 1-12
-
-
Naor, M.1
Shamir, A.2
-
9
-
-
84947903522
-
Optimum secret sharing scheme secure against cheating
-
Ueli M. Maurer (ed.), Lecture Notes in Computer Science, Springer-Verlag, New York
-
W. Ogata and K. Kurosawa, Optimum secret sharing scheme secure against cheating, In Ueli M. Maurer (ed.), Advances in Cryptology - Proceedings of Eurocypto 96, Lecture Notes in Computer Science, Springer-Verlag, New York, 1070 (1996) pp. 200-211.
-
(1996)
Advances in Cryptology - Proceedings of Eurocypto 96
, vol.1070
, pp. 200-211
-
-
Ogata, W.1
Kurosawa, K.2
-
10
-
-
0024641589
-
Efficient dispersal of information for security, load balancing, and fault tolerance
-
M. Rabin, Efficient dispersal of information for security, load balancing, and fault tolerance, J. ACM, Vol. 36 (1989) pp. 335-348.
-
(1989)
J. ACM
, vol.36
, pp. 335-348
-
-
Rabin, M.1
-
11
-
-
0018545449
-
How to share a secret
-
A. Shamir, How to share a secret, Comm. ACM, Vol. 22 (1979) pp. 612-613.
-
(1979)
Comm. ACM
, vol.22
, pp. 612-613
-
-
Shamir, A.1
-
12
-
-
0003038453
-
An introduction to shared secret and/or shared control schemes and their applications
-
IEEE Press, Piscataway
-
G. J. Simmons, An introduction to shared secret and/or shared control schemes and their applications, Contemporary Cryptology, IEEE Press, Piscataway (1991) pp. 491-497.
-
(1991)
Contemporary Cryptology
, pp. 491-497
-
-
Simmons, G.J.1
-
13
-
-
0024141971
-
How to share a secret with cheaters
-
M. Tompa and H. Woll, How to share a secret with cheaters, J. Cryptology, Vol. 1 (1988) pp. 133-138.
-
(1988)
J. Cryptology
, vol.1
, pp. 133-138
-
-
Tompa, M.1
Woll, H.2
-
14
-
-
0034251536
-
Repeating image watermarking technique by the visual cryptography
-
C. C. Wang, S. C. Tai and C. S. Yu, Repeating image watermarking technique by the visual cryptography, IEICE Trans. Fundamentals, Vol. E83-A (2000) pp. 1589-1598.
-
(2000)
IEICE Trans. Fundamentals
, vol.E83-A
, pp. 1589-1598
-
-
Wang, C.C.1
Tai, S.C.2
Yu, C.S.3
|