Linguistic Approach to Cryptographic Data Sharing
暂无分享,去创建一个
[1] John Bloom,et al. A modular approach to key safeguarding , 1983, IEEE Trans. Inf. Theory.
[2] Tzong-Chen Wu,et al. A geometric approach for sharing secrets , 1995, Comput. Secur..
[3] Marten van Dijk. A Linear Construction of Secret Sharing Schemes , 1997, Des. Codes Cryptogr..
[4] Gustavus J. Simmons,et al. How to (Really) Share a Secret , 1988, CRYPTO.
[5] Marek R. Ogiela,et al. Modern Computational Intelligence Methods for the Interpretation of Medical Images , 2008, Studies in Computational Intelligence.
[6] Adi Shamir,et al. How to share a secret , 1979, CACM.
[7] Keith M. Martin,et al. Geometric secret sharing schemes and their duals , 1994, Des. Codes Cryptogr..
[8] W. Pedrycz,et al. Medical Image Understanding Technology , 2005, IEEE Transactions on Neural Networks.
[9] Wu Tzong-Chen,et al. Refereed paper: A geometric approach for sharing secrets , 1995 .
[10] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).