-
2
-
-
84947751790
-
Constructions and bounds for visual cryptography
-
Meyer auf der Heide, F, Monien, B, eds, ICALP 1996, Springer, Heidelberg
-
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Constructions and bounds for visual cryptography. In: Meyer auf der Heide, F., Monien, B. (eds.) ICALP 1996. LNCS, vol. 1099, pp. 416-428. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1099
, pp. 416-428
-
-
Ateniese, G.1
Blundo, C.2
De Santis, A.3
Stinson, D.R.4
-
3
-
-
84957652167
-
General short computational secret sharing schemes
-
Guillou, L.C, Quisquater, J.-J, eds, EUROCRYPT 1995, Springer, Heidelberg
-
Beguin, P., Cresti, A.: General short computational secret sharing schemes. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 194-208. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.921
, pp. 194-208
-
-
Beguin, P.1
Cresti, A.2
-
6
-
-
84920422930
-
One-time pads are key safeguarding schemes, not cryptosystems: Fast key safeguarding schemes (threshold schemes) exist
-
IEEE Press, Los Alamitos
-
Blakley, G.R.: One-time pads are key safeguarding schemes, not cryptosystems: Fast key safeguarding schemes (threshold schemes) exist. In: Proceedings of the 1980 Symposium on Security and Privacy, pp. 108-113. IEEE Press, Los Alamitos (1980)
-
(1980)
Proceedings of the 1980 Symposium on Security and Privacy
, pp. 108-113
-
-
Blakley, G.R.1
-
7
-
-
0031222285
-
Lower bounds for robust secret sharing schemes
-
Blundo, C., De Santis, A.: Lower bounds for robust secret sharing schemes. Inform. Process. Lett. 63, 317-321 (1997)
-
(1997)
Inform. Process. Lett
, vol.63
, pp. 317-321
-
-
Blundo, C.1
De Santis, A.2
-
8
-
-
67650640434
-
Generalised cumulative arrays and their application to secret sharing schemes
-
Charnes, C., Pieprzyk, J.: Generalised cumulative arrays and their application to secret sharing schemes. Australian Computer Science Communications 17, 61-65 (1995)
-
(1995)
Australian Computer Science Communications
, vol.17
, pp. 61-65
-
-
Charnes, C.1
Pieprzyk, J.2
-
9
-
-
85023809951
-
Threshold Cryptosystems
-
Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
-
Desmedt, Y., Frankel, Y.: Threshold Cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307-315. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
10
-
-
34247555884
-
Privacy-preserving data mining Systems
-
Hang, N., Zhao, W.: Privacy-preserving data mining Systems. Computer 40, 52-58 (2007)
-
(2007)
Computer
, vol.40
, pp. 52-58
-
-
Hang, N.1
Zhao, W.2
-
11
-
-
0013229183
-
Ideal secret sharing schemes with multiple secrets
-
Jackson, W.-A., Martin, K.M., O'Keefe, C.M.: Ideal secret sharing schemes with multiple secrets. Journal of Cryptology 9, 233-250 (1996)
-
(1996)
Journal of Cryptology
, vol.9
, pp. 233-250
-
-
Jackson, W.-A.1
Martin, K.M.2
O'Keefe, C.M.3
-
14
-
-
0003038453
-
An Introduction to Shared Secret and/or Shared Control Schemes and Their Application in Contemporary Cryptology
-
IEEE Press, Los Alamitos
-
Simmons, G.J.: An Introduction to Shared Secret and/or Shared Control Schemes and Their Application in Contemporary Cryptology. The Science of Information Integrity, pp. 441-497. IEEE Press, Los Alamitos (1992)
-
(1992)
The Science of Information Integrity
, pp. 441-497
-
-
Simmons, G.J.1
-
15
-
-
15944409593
-
Simple Secret Sharing and Threshold RSA Signature Schemes
-
Tang, S.: Simple Secret Sharing and Threshold RSA Signature Schemes. Journal of Information and Computational Science 1, 259-262 (2004)
-
(2004)
Journal of Information and Computational Science
, vol.1
, pp. 259-262
-
-
Tang, S.1
-
16
-
-
0029211714
-
A geometric approach for sharing secrets
-
Wu, T.-C., He, W.-H.: A geometric approach for sharing secrets. Computers and Security 14, 135-146 (1995)
-
(1995)
Computers and Security
, vol.14
, pp. 135-146
-
-
Wu, T.-C.1
He, W.-H.2
|