Confidential Data Dispersion using Thresholding
暂无分享,去创建一个
[1] Tzong-Chen Wu,et al. Cheating detection and cheater identification in secret sharing schemes , 1995 .
[2] Laurent Lefèvre,et al. On Improving the Reliability of Internet Services through Active Replication , 2008, 2008 Ninth International Conference on Parallel and Distributed Computing, Applications and Technologies.
[3] Amos Beimel,et al. Secret Sharing With Public Reconstruction , 1998 .
[4] Alfredo De Santis,et al. Randomness in Distribution Protocols , 1996, Inf. Comput..
[5] Barbara Masucci,et al. A Note on the Randomness in Dynamic Threshold Schemes , 1999, J. Comput. Secur..
[6] Alfredo De Santis,et al. Efficient Sharing of Many Secrets , 1993, STACS.
[7] Douglas R. Stinson,et al. A Combinatorial Approach to Threshold Schemes , 1987, SIAM J. Discret. Math..
[8] Douglas R. Stinson,et al. Cryptography: Theory and Practice , 1995 .
[9] Catherine A. Meadows,et al. Security of Ramp Schemes , 1985, CRYPTO.
[10] James E. Smith,et al. Implementing high availability memory with a duplication cache , 2008, 2008 41st IEEE/ACM International Symposium on Microarchitecture.
[11] G. R. BLAKLEY. Safeguarding cryptographic keys , 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK).