메뉴 건너뛰기




Volumn 4116 LNCS, Issue , 2006, Pages 229-241

Rational secret sharing, revisited

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL METHODS; COMPUTER NETWORKS; FUNCTIONS; PROBLEM SOLVING; SECURITY OF DATA;

EID: 33750018128     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: None     Document Type: Conference Paper
Times cited : (156)

References (15)
  • 2
    • 85062838317 scopus 로고
    • Safeguarding cryptographic keys
    • AFIPS Press
    • G.R. Blakley. Safeguarding Cryptographic Keys. National Computer Conference, vol. 48, pp. 313-317, AFIPS Press, 1979.
    • (1979) National Computer Conference , vol.48 , pp. 313-317
    • Blakley, G.R.1
  • 13
    • 0018545449 scopus 로고
    • How to share a secret
    • A. Shamir. How to Share a Secret. Comm. ACM, 22(11): 612-613 (1979).
    • (1979) Comm. ACM , vol.22 , Issue.11 , pp. 612-613
    • Shamir, A.1
  • 14
    • 25444462746 scopus 로고    scopus 로고
    • Non-cooperative computing: Boolean functions with correctness and exclusivity
    • Y. Shoham and M. Tennenholtz. Non-Cooperative Computing: Boolean Functions with Correctness and Exclusivity. Theoretical Computer Science 343(1-2): 97-113 (2005).
    • (2005) Theoretical Computer Science , vol.343 , Issue.1-2 , pp. 97-113
    • Shoham, Y.1    Tennenholtz, M.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.