Visual Crypto Displays Enabling Secure Communications
暂无分享,去创建一个
[1] Eric R. Verheul,et al. Constructions and Properties of k out of n Visual Secret Sharing Schemes , 1997, Des. Codes Cryptogr..
[2] Henk D. L. Hollmann,et al. A polarisation based Visual Crypto System and its Secret Sharing Schemes , 2002, IACR Cryptol. ePrint Arch..
[3] Moni Naor,et al. Visual Cryptography , 1994, Encyclopedia of Multimedia.
[4] Gustavus J. Simmons,et al. A survey of information authentication , 1988, Proc. IEEE.
[5] Alfredo De Santis,et al. On the Contrast in Visual Cryptography Schemes , 1999, Journal of Cryptology.
[6] Srinivas Devadas,et al. Proxy-based security protocols in networked mobile devices , 2002, SAC '02.
[7] Srinivas Devadas,et al. The untrusted computer problem and camera based authentication using optical character recognition , 2002 .
[8] Alfred Menezes,et al. Handbook of Applied Cryptography , 2018 .
[9] P ? ? ? ? ? ? ? % ? ? ? ? , 1991 .
[10] Hideki Imai,et al. Human Identification Through Insecure Channel , 1991, EUROCRYPT.
[11] Moni Naor,et al. Visual Authentication and Identification , 1997, CRYPTO.
[12] Tsutomu Matsumoto. Human-computer cryptography: An attempt , 1998 .
[13] Faculteit Toegepaste Wetenschappen,et al. ANALYSIS AND DESIGN OF AN ADVANCED INFRASTRUCTURE FOR SECURE AND ANONYMOUS ELECTRONIC PAYMENT SYSTEMS ON THE INTERNET , 2002 .