共 50 条
- [41] SSeCloud: Using secret sharing scheme to secure keys [J]. 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, ENERGY TECHNOLOGY AND ENVIRONMENTAL ENGINEERING (MSETEE 2017), 2017, 81
- [42] Toward a secure protection scheme for visual secret sharing [J]. IMAGING SCIENCE JOURNAL, 2014, 62 (06): : 342 - 352
- [43] Encryption On Grayscale Image For Digital Image Confidentiality Using Shamir Secret Sharing Scheme [J]. 4TH INTERNATIONAL CONFERENCE ON SCIENCE & ENGINEERING IN MATHEMATICS, CHEMISTRY AND PHYSICS 2016 (SCIETECH 2016), 2016, 710
- [44] Building a Secure Scheme for a Trusted Hardware Sharing Environment [J]. IEEE ACCESS, 2017, 5 : 20260 - 20271
- [45] Shamir Secret Sharing Scheme Based Method of Tampering Detection and Recovery for Document Image [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (06): : 1356 - 1369
- [46] Authentication as A Service Based on Shamir Secret Sharing [J]. 2021 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROLS (ISCSIC 2021), 2021, : 368 - 373
- [47] Efficient Computation Method of Participants' Weights in Shamir's Secret Sharing [J]. SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 598 - 605
- [48] A 256 Bit Implementation of ECC-RFID Based System using Shamir Secret Sharing Scheme and Keccak Hash Function [J]. 2017 NINTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2017), 2017, : 165 - 171
- [49] UNCONDITIONALLY SECURE FAIR (t, n)-SECRET SHARING SCHEME [J]. ADVANCES AND APPLICATIONS IN DISCRETE MATHEMATICS, 2023, 38 (01): : 127 - 143
- [50] A secure and efficient secret sharing scheme with general access structures [J]. FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2006, 4223 : 646 - 649