-
2
-
-
84947751790
-
Constructions and bounds for visual cryptography
-
Meyer auf der Heide, F., Monien, B. (eds.) ICALP 1996. Springer, Heidelberg
-
Ateniese, G., Blundo, C., De Santis, A., Stinson, D.R.: Constructions and bounds for visual cryptography. In: Meyer auf der Heide, F., Monien, B. (eds.) ICALP 1996. LNCS, vol.1099, pp. 416-428. Springer, Heidelberg (1996)
-
(1996)
LNCS
, vol.1099
, pp. 416-428
-
-
Ateniese, G.1
Blundo, C.2
De Santis, A.3
Stinson, D.R.4
-
3
-
-
84957652167
-
General short computational secret sharing schemes
-
Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. Springer, Heidelberg
-
Beguin, P., Cresti, A.: General short computational secret sharing schemes. In: Guillou, L.C., Quisquater, J.-J. (eds.) EUROCRYPT 1995. LNCS, vol.921, pp. 194-208. Springer, Heidelberg (1995)
-
(1995)
LNCS
, vol.921
, pp. 194-208
-
-
Beguin, P.1
Cresti, A.2
-
6
-
-
85028918825
-
Threshold schemes with disenrollment
-
Brickell, E.F. (ed.) CRYPTO 1992. Springer, Heidelberg
-
Blakley, B., Blakley, G.R., Chan, A.H., Massey, J.: Threshold schemes with disenrollment. In: Brickell, E.F. (ed.) CRYPTO 1992. LNCS, vol.740, pp. 540-548. Springer, Heidelberg (1993)
-
(1993)
LNCS
, vol.740
, pp. 540-548
-
-
Blakley, B.1
Blakley, G.R.2
Chan, A.H.3
Massey, J.4
-
7
-
-
0031222285
-
Lower bounds for robust secret sharing schemes
-
Blundo, C., De Santis, A.: Lower bounds for robust secret sharing schemes. Inform. Process. Lett. 63, 317-321 (1997)
-
(1997)
Inform. Process. Lett.
, vol.63
, pp. 317-321
-
-
Blundo, C.1
De Santis, A.2
-
8
-
-
67650640434
-
Generalised cumulative arrays and their application to secret sharing schemes
-
Charnes, C., Pieprzyk, J.: Generalised cumulative arrays and their application to secret sharing schemes. Australian Computer Science Communications 17, 61-65 (1995)
-
(1995)
Australian Computer Science Communications
, vol.17
, pp. 61-65
-
-
Charnes, C.1
Pieprzyk, J.2
-
9
-
-
85023809951
-
Threshold cryptosystems
-
Brassard, G. (ed.) CRYPTO 1989. Springer, Heidelberg
-
Desmedt, Y., Frankel, Y.: Threshold Cryptosystems. In: Brassard, G. (ed.) CRYPTO 1989. LNCS, vol.435, pp. 307-315. Springer, Heidelberg (1990)
-
(1990)
LNCS
, vol.435
, pp. 307-315
-
-
Desmedt, Y.1
Frankel, Y.2
-
10
-
-
0001522694
-
On the information rate of perfect secret sharing schemes
-
van Dijk, M.: On the information rate of perfect secret sharing schemes. Designs, Codes and Cryptography 6, 143-169 (1995)
-
(1995)
Designs, Codes and Cryptography
, vol.6
, pp. 143-169
-
-
Van Dijk, M.1
-
11
-
-
34247555884
-
Privacy-preserving data mining systems
-
Hang, N., Zhao, W.: Privacy-preserving data mining Systems. Computer 40(4), 52-58 (2007)
-
(2007)
Computer
, vol.40
, Issue.4
, pp. 52-58
-
-
Hang, N.1
Zhao, W.2
-
12
-
-
0013229183
-
Ideal secret sharing schemes with multiple secrets
-
Jackson, W.-A., Martin, K.M., O'Keefe, C.M.: Ideal secret sharing schemes with multiple secrets. Journal of Cryptology 9, 233-250 (1996)
-
(1996)
Journal of Cryptology
, vol.9
, pp. 233-250
-
-
Jackson, W.-A.1
Martin, K.M.2
O'Keefe, C.M.3
-
13
-
-
60349097094
-
Linguistic extension for secret sharing (m, n)-threshold schemes
-
Hainan Island, Sanya, China, December 13-15, ISBN: 978-0-7695-3486-2, doi:10.1109/SecTech.2008.15
-
Ogiela, M.R., Ogiela, U.: Linguistic Extension for Secret Sharing (m, n)-threshold Schemes. In: SecTech 2008 - 2008 International Conference on Security Technology, Hainan Island, Sanya, China, December 13-15, pp. 125-128 (2008), ISBN: 978-0-7695- 3486-2, doi:10.1109/SecTech.2008.15
-
(2008)
SecTech 2008 - 2008 International Conference on Security Technology
, pp. 125-128
-
-
Ogiela, M.R.1
Ogiela, U.2
-
15
-
-
0003038453
-
An introduction to shared secret and/or shared control schemes and their application in contemporary cryptology
-
IEEE Press, Los Alamitos
-
Simmons, G.J.: An Introduction to Shared Secret and/or Shared Control Schemes and Their Application in Contemporary Cryptology. In: The Science of Information Integrity, pp. 441-497. IEEE Press, Los Alamitos (1992)
-
(1992)
The Science of Information Integrity
, pp. 441-497
-
-
Simmons, G.J.1
-
16
-
-
15944409593
-
Simple secret sharing and threshold RSA signature schemes
-
Tang, S.: Simple Secret Sharing and Threshold RSA Signature Schemes. Journal of Information and Computational Science 1, 259-262 (2004)
-
(2004)
Journal of Information and Computational Science
, vol.1
, pp. 259-262
-
-
Tang, S.1
|