-
1
-
-
0002015048
-
"Visual cryptography for general access structures"
-
G. Ateniese, C. Blundo, A. De Santis, and D. R. Stinson, "Visual cryptography for general access structures," Inf. Comput., vol. 129, no. 2, pp. 86-106, 1996.
-
(1996)
Inf. Comput.
, vol.129
, Issue.2
, pp. 86-106
-
-
Ateniese, G.1
Blundo, C.2
De Santis, A.3
Stinson, D.R.4
-
2
-
-
0034899594
-
"Extended capabilities for visual cryptography"
-
G. Ateniese, "Extended capabilities for visual cryptography," Theoret. Comput. Sci., vol. 250, no. 1-2, pp. 143-161, 2001.
-
(2001)
Theoret. Comput. Sci.
, vol.250
, Issue.1-2
, pp. 143-161
-
-
Ateniese, G.1
-
3
-
-
0011443381
-
"Traceable visual cryptography"
-
in LNCS
-
I. Biehl and S. Wetzel, "Traceable visual cryptography," in Proc. 1st Int. Conf. Information Communication Security, 1997, vol. 1334, LNCS, pp. 61-71.
-
(1997)
Proc. 1st Int. Conf. Information Communication Security
, vol.1334
, pp. 61-71
-
-
Biehl, I.1
Wetzel, S.2
-
4
-
-
0032116603
-
"Visual cryptography schemes with perfect reconstructions of black pixels"
-
C. Blundo and A. De Santis, "Visual cryptography schemes with perfect reconstructions of black pixels," Comput. Graph., vol. 22, no. 4, pp. 449-455, 1998.
-
(1998)
Comput. Graph.
, vol.22
, Issue.4
, pp. 449-455
-
-
Blundo, C.1
De Santis, A.2
-
5
-
-
0000437895
-
"On the contrast in visual cryptography schemes"
-
C. Blundo, A. De Santis, and D. R. Stinson, "On the contrast in visual cryptography schemes," J. Cryptol., vol. 12, no. 4, pp. 261-289, 1999.
-
(1999)
J. Cryptol.
, vol.12
, Issue.4
, pp. 261-289
-
-
Blundo, C.1
De Santis, A.2
Stinson, D.R.3
-
6
-
-
0038813895
-
"Contrast optimal threshold visual cryptography schemes"
-
C. Blundo, P. D'Arco, A. De Santis, and D. R. Stinson, "Contrast optimal threshold visual cryptography schemes," SIAM J. Discrete Math., vol. 16, no. 2, pp. 224-261, 2003.
-
(2003)
SIAM J. Discrete Math.
, vol.16
, Issue.2
, pp. 224-261
-
-
Blundo, C.1
D'Arco, P.2
De Santis, A.3
Stinson, D.R.4
-
7
-
-
0005167951
-
"The detection of cheaters in threshold schemes"
-
E. F. Brickell and D. R. Stinson, "The detection of cheaters in threshold schemes," SIAM J. Discrete Math., vol. 4, no. 4, pp. 502-510, 1991.
-
(1991)
SIAM J. Discrete Math.
, vol.4
, Issue.4
, pp. 502-510
-
-
Brickell, E.F.1
Stinson, D.R.2
-
8
-
-
25444452129
-
"Ideal contrast visual cryptography schemes with reversing"
-
S. Cimato, A. De Santis, A. L. Ferrara, and B. Masucci, "Ideal contrast visual cryptography schemes with reversing," Inf. Process. Lett., vol. 93, no. 4, pp. 199-206, 2005.
-
(2005)
Inf. Process. Lett.
, vol.93
, Issue.4
, pp. 199-206
-
-
Cimato, S.1
De Santis, A.2
Ferrara, A.L.3
Masucci, B.4
-
9
-
-
1642601966
-
"Randomness in secret sharing and visual cryptography schemes"
-
A. De Bonis and A. De Santis, "Randomness in secret sharing and visual cryptography schemes," Theoret. Comput. Sci., vol. 314, no. 3, pp. 351-374, 2004.
-
(2004)
Theoret. Comput. Sci.
, vol.314
, Issue.3
, pp. 351-374
-
-
De Bonis, A.1
De Santis, A.2
-
10
-
-
84955572416
-
"New results on visual cryptography"
-
in LNCS
-
S. Droste, "New results on visual cryptography," in Proc. Advances in Cryptology, 1996, vol. 1109, LNCS, pp. 401-415.
-
(1996)
Proc. Advances in Cryptology
, vol.1109
, pp. 401-415
-
-
Droste, S.1
-
11
-
-
31244437258
-
"Threshold visual cryptography with specified whiteness levels of reconstructed pixels"
-
P. A. Eisen and D. R. Stinson, "Threshold visual cryptography with specified whiteness levels of reconstructed pixels," Designs, Codes, Cryptog., vol. 25, no. 1, pp. 15-61, 2002.
-
(2002)
Designs, Codes, Cryptog.
, vol.25
, Issue.1
, pp. 15-61
-
-
Eisen, P.A.1
Stinson, D.R.2
-
12
-
-
2942711480
-
"A cheater detectable visual cryptography scheme"
-
(in Chinese)
-
H. Yan, Z. Gan, and K. Chen, "A cheater detectable visual cryptography scheme," (in Chinese) J. Shanghai Jiaotong Univ., vol. 38, no. 1, 2004.
-
(2004)
J. Shanghai Jiaotong Univ.
, vol.38
, Issue.1
-
-
Yan, H.1
Gan, Z.2
Chen, K.3
-
13
-
-
0037600743
-
"Contrast-optimal k out of n secret sharing schemes in visual cryptography"
-
T. Hofmeister, M. Krause, and H.-U. Simon, "Contrast-optimal k out of n secret sharing schemes in visual cryptography," Theoret. Comput. Sci., vol. 240, no. 2, pp. 471-485, 2000.
-
(2000)
Theoret. Comput. Sci.
, vol.240
, Issue.2
, pp. 471-485
-
-
Hofmeister, T.1
Krause, M.2
Simon, H.-U.3
-
14
-
-
30744474182
-
"Cheating, in visual cryptography"
-
G.-B. Horng, T.-G. Chen, and D.-S. Tsai, "Cheating in visual cryptography," Designs, Codes, Cryptog., vol. 38, no. 2, pp. 219-236, 2006.
-
(2006)
Designs, Codes, Cryptog.
, vol.38
, Issue.2
, pp. 219-236
-
-
Horng, G.-B.1
Chen, T.-G.2
Tsai, D.-S.3
-
15
-
-
33645978382
-
"Compatible ideal contrast visual cryptography with reversing"
-
in LNCS
-
C.-M. Hu and W.-G. Tzeng, "Compatible ideal contrast visual cryptography with reversing," in Proc. 8th Information Security Conf., 2005, vol. 3650, LNCS, pp. 300-313.
-
(2005)
Proc. 8th Information Security Conf.
, vol.3650
, pp. 300-313
-
-
Hu, C.-M.1
Tzeng, W.-G.2
-
16
-
-
0037658469
-
"Determining the optimal contrast for secret sharing schemes in visual cryptography"
-
M. Krause and H.-U. Simon, "Determining the optimal contrast for secret sharing schemes in visual cryptography," Combin., Probab., Comput., vol. 12, no. 3, pp. 285-299, 2003.
-
(2003)
Combin., Probab., Comput.
, vol.12
, Issue.3
, pp. 285-299
-
-
Krause, M.1
Simon, H.-U.2
-
17
-
-
10044234541
-
"Image size invariant visual cryptography"
-
R. Ito, H. Kuwakado, and H. Tanaka, "Image size invariant visual cryptography," IEICE Trans. Fundam. A, vol. E 82, no. 10, pp. 2172-2176, 1999.
-
(1999)
IEICE Trans. Fundam. A
, vol.E82
, Issue.10
, pp. 2172-2176
-
-
Ito, R.1
Kuwakado, H.2
Tanaka, H.3
-
18
-
-
84958648410
-
"Visual authentication and identification"
-
in LNCS
-
M. Naor and B. Pinkas, "Visual authentication and identification," in Proc. Advances in Cryptology, 1997, vol. 1294, LNCS, pp. 322-336.
-
(1997)
Proc. Advances in Cryptology
, vol.1294
, pp. 322-336
-
-
Naor, M.1
Pinkas, B.2
-
19
-
-
84926193517
-
"Visual cryptography"
-
in LNCS
-
M. Naor and A. Shamir, "Visual cryptography," in Proc. Advances in Cryptology, 1994, vol. 950, LNCS, pp. 1-12.
-
(1994)
Proc. Advances in Cryptology
, vol.950
, pp. 1-12
-
-
Naor, M.1
Shamir, A.2
-
20
-
-
0018545449
-
"How to share a secret"
-
A. Shamir, "How to share a secret," Commun. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Commun. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
21
-
-
0024141971
-
"How to share a secret with cheaters"
-
M. Tompa and H. Woll, "How to share a secret with cheaters," J. Cryptol., vol. 1, no. 2, pp. 133-138, 1988.
-
(1988)
J. Cryptol.
, vol.1
, Issue.2
, pp. 133-138
-
-
Tompa, M.1
Woll, H.2
-
22
-
-
31244432974
-
"A new approach for visual cryptography"
-
W.-G. Tzeng and C.-M. Hu, "A new approach for visual cryptography," Designs, Codes, Cryptog., vol. 27, no. 3, pp. 207-227, 2002.
-
(2002)
Designs, Codes, Cryptog.
, vol.27
, Issue.3
, pp. 207-227
-
-
Tzeng, W.-G.1
Hu, C.-M.2
-
23
-
-
0000049121
-
"Constructions and properties of k out of n visual secret sharing schemes"
-
E. R. Verheul and H. C. A. Van Tilborg, "Constructions and properties of k out of n visual secret sharing schemes," Designs, Codes, Cryptog,, vol. 11, no. 2, pp. 179-196, 1997.
-
(1997)
Designs, Codes, Cryptog.
, vol.11
, Issue.2
, pp. 179-196
-
-
Verheul, E.R.1
Van Tilborg, H.C.A.2
-
24
-
-
84958770384
-
"Almost ideal contrast visual cryptography with reversing"
-
in LNCS
-
D. Q. Viet and K. Kurosawa, "Almost ideal contrast visual cryptography with reversing," in Proc, Topics in Cryptology, 2004, vol. 2964, LNCS, pp. 353-365.
-
(2004)
Proc, Topics in Cryptology
, vol.2964
, pp. 353-365
-
-
Viet, D.Q.1
Kurosawa, K.2
-
25
-
-
0442280816
-
"New visual secret sharing schemes using probabilistic method"
-
C.-N. Yang, "New visual secret sharing schemes using probabilistic method," Pattern Recognit. Lett., vol. 25, no. 4, pp. 481-494, 2004.
-
(2004)
Pattern Recognit. Lett.
, vol.25
, Issue.4
, pp. 481-494
-
-
Yang, C.-N.1
-
26
-
-
33947314440
-
"Some new types of visual secret sharing schemes"
-
C.-N. Yang and C.-S. Laih, "Some new types of visual secret sharing schemes," in Proc. Nat. Computer Symp., 1999, vol. 3, pp. 260-268.
-
(1999)
Proc. Nat. Computer Symp.
, vol.3
, pp. 260-268
-
-
Yang, C.-N.1
Laih, C.-S.2
|