메뉴 건너뛰기




Volumn 226, Issue , 2009, Pages 13-20

Security of linguistic threshold schemes in multimedia systems

Author keywords

[No Author keywords available]

Indexed keywords


EID: 67650606748     PISSN: 1860949X     EISSN: None     Source Type: Book Series    
DOI: 10.1007/978-3-642-02937-0_2     Document Type: Article
Times cited : (36)

References (16)
  • 2
    • 84947751790 scopus 로고    scopus 로고
    • Constructions and bounds for visual cryptography
    • Meyer auf der Heide, F, Monien, B, eds, ICALP 1996, Springer, Heidelberg
    • Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Constructions and bounds for visual cryptography. In: Meyer auf der Heide, F., Monien, B. (eds.) ICALP 1996. LNCS, vol. 1099, pp. 416-428. Springer, Heidelberg (1996)
    • (1996) LNCS , vol.1099 , pp. 416-428
    • Ateniese, G.1    Blundo, C.2    De Santis, A.3    Stinson, D.R.4
  • 3
    • 84957652167 scopus 로고
    • General short computational secret sharing schemes
    • Guillou, L.C, Quisquater, J.-J, eds, EUROCRYPT 1995, Springer, Heidelberg
    • Beguin, P., Cresti, A.: General short computational secret sharing schemes. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol. 921, pp. 194-208. Springer, Heidelberg (1995)
    • (1995) LNCS , vol.921 , pp. 194-208
    • Beguin, P.1    Cresti, A.2
  • 6
    • 84920422930 scopus 로고
    • One-time pads are key safeguarding schemes, not cryptosystems: Fast key safeguarding schemes (threshold schemes) exist
    • IEEE Press, Los Alamitos
    • Blakley, G.R.: One-time pads are key safeguarding schemes, not cryptosystems: Fast key safeguarding schemes (threshold schemes) exist. In: Proceedings of the 1980 Symposium on Security and Privacy, pp. 108-113. IEEE Press, Los Alamitos (1980)
    • (1980) Proceedings of the 1980 Symposium on Security and Privacy , pp. 108-113
    • Blakley, G.R.1
  • 7
    • 0031222285 scopus 로고    scopus 로고
    • Lower bounds for robust secret sharing schemes
    • Blundo, C., De Santis, A.: Lower bounds for robust secret sharing schemes. Inform. Process. Lett. 63, 317-321 (1997)
    • (1997) Inform. Process. Lett , vol.63 , pp. 317-321
    • Blundo, C.1    De Santis, A.2
  • 8
    • 67650640434 scopus 로고
    • Generalised cumulative arrays and their application to secret sharing schemes
    • Charnes, C., Pieprzyk, J.: Generalised cumulative arrays and their application to secret sharing schemes. Australian Computer Science Communications 17, 61-65 (1995)
    • (1995) Australian Computer Science Communications , vol.17 , pp. 61-65
    • Charnes, C.1    Pieprzyk, J.2
  • 9
    • 85023809951 scopus 로고
    • Threshold Cryptosystems
    • Brassard, G, ed, CRYPTO 1989, Springer, Heidelberg
    • Desmedt, Y., Frankel, Y.: Threshold Cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol. 435, pp. 307-315. Springer, Heidelberg (1990)
    • (1990) LNCS , vol.435 , pp. 307-315
    • Desmedt, Y.1    Frankel, Y.2
  • 10
    • 34247555884 scopus 로고    scopus 로고
    • Privacy-preserving data mining Systems
    • Hang, N., Zhao, W.: Privacy-preserving data mining Systems. Computer 40, 52-58 (2007)
    • (2007) Computer , vol.40 , pp. 52-58
    • Hang, N.1    Zhao, W.2
  • 14
    • 0003038453 scopus 로고
    • An Introduction to Shared Secret and/or Shared Control Schemes and Their Application in Contemporary Cryptology
    • IEEE Press, Los Alamitos
    • Simmons, G.J.: An Introduction to Shared Secret and/or Shared Control Schemes and Their Application in Contemporary Cryptology. The Science of Information Integrity, pp. 441-497. IEEE Press, Los Alamitos (1992)
    • (1992) The Science of Information Integrity , pp. 441-497
    • Simmons, G.J.1
  • 15
    • 15944409593 scopus 로고    scopus 로고
    • Simple Secret Sharing and Threshold RSA Signature Schemes
    • Tang, S.: Simple Secret Sharing and Threshold RSA Signature Schemes. Journal of Information and Computational Science 1, 259-262 (2004)
    • (2004) Journal of Information and Computational Science , vol.1 , pp. 259-262
    • Tang, S.1
  • 16
    • 0029211714 scopus 로고
    • A geometric approach for sharing secrets
    • Wu, T.-C., He, W.-H.: A geometric approach for sharing secrets. Computers and Security 14, 135-146 (1995)
    • (1995) Computers and Security , vol.14 , pp. 135-146
    • Wu, T.-C.1    He, W.-H.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.