Near Optimal Secret Sharing for Information Leakage Maximization
暂无分享,去创建一个
[1] Adi Shamir,et al. How to share a secret , 1979, CACM.
[2] Gregory Levitin. Optimal Defense Strategy Against Intentional Attacks , 2007, IEEE Transactions on Reliability.
[3] Axel W. Krings,et al. Security and Survivability of Networked Systems , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[4] Pradeep K. Khosla,et al. Survivable Information Storage Systems , 2000, Computer.
[5] Douglas M. Blough,et al. An approach for fault tolerant and secure data storage in collaborative work environments , 2005, StorageSS '05.
[6] Nicholas Kyriakopoulos,et al. A comparative analysis of network dependability, fault-tolerance, reliability, security, and survivability , 2009, IEEE Communications Surveys & Tutorials.
[7] Marshall L. Fisher,et al. An Applications Oriented Guide to Lagrangian Relaxation , 1985 .
[8] Hugo Krawczyk,et al. Proactive Secret Sharing Or: How to Cope With Perpetual Leakage , 1995, CRYPTO.