A RAMP CODE FOR FINE -GRAINED ACCESS CONTROL
暂无分享,去创建一个
[1] G. R. Blakley,et al. Safeguarding cryptographic keys , 1899, 1979 International Workshop on Managing Requirements Knowledge (MARK).
[2] Kannan Karthik,et al. Secure Group Authentication Using a Non-Perfect Secret Sharing Scheme Based on Controlled Mixing , 2009, 2009 Annual IEEE India Conference.
[3] Kannan Karthik,et al. Multimedia Encoding for Access Control with Traitor Tracing - Balancing Secrecy, Privacy and Traceability , 2008 .
[4] Ehud D. Karnin,et al. On secret sharing systems , 1983, IEEE Trans. Inf. Theory.
[5] Xiao Liangliang,et al. Linear multi-secret sharing schemes , 2005 .
[6] Adi Shamir,et al. How to share a secret , 1979, CACM.
[7] Kannan Karthik,et al. A Unified Approach To Construct Non-perfect Secret Sharing And Traitor Tracing Schemes , 2007, Security and Management.
[8] Kannan Karthik,et al. Secure fingerprint embedding based on modified GDFT based parametric transform , 2011, 2011 International Conference on Image Information Processing.
[9] Liangliang Xiao,et al. Linear multi-secret sharing schemes , 2007, Science in China Series F: Information Sciences.
[10] Mitsuru Ito,et al. Secret sharing scheme realizing general access structure , 1989 .
[11] Catherine A. Meadows,et al. Security of Ramp Schemes , 1985, CRYPTO.
[12] Ja-Chen Lin,et al. Secret image sharing , 2002, Comput. Graph..
[13] László Csirmaz. Ramp secret sharing and secure information storage , 2009 .