共 50 条
- [41] SSeCloud: Using secret sharing scheme to secure keys [J]. 2ND INTERNATIONAL CONFERENCE ON MATERIALS SCIENCE, ENERGY TECHNOLOGY AND ENVIRONMENTAL ENGINEERING (MSETEE 2017), 2017, 81
- [42] Toward a secure protection scheme for visual secret sharing [J]. IMAGING SCIENCE JOURNAL, 2014, 62 (06): : 342 - 352
- [43] Encryption On Grayscale Image For Digital Image Confidentiality Using Shamir Secret Sharing Scheme [J]. 4TH INTERNATIONAL CONFERENCE ON SCIENCE & ENGINEERING IN MATHEMATICS, CHEMISTRY AND PHYSICS 2016 (SCIETECH 2016), 2016, 710
- [44] Authentication as A Service Based on Shamir Secret Sharing [J]. 2021 INTERNATIONAL SYMPOSIUM ON COMPUTER SCIENCE AND INTELLIGENT CONTROLS (ISCSIC 2021), 2021, : 368 - 373
- [45] Shamir Secret Sharing Scheme Based Method of Tampering Detection and Recovery for Document Image [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2022, 59 (06): : 1356 - 1369
- [46] Building a Secure Scheme for a Trusted Hardware Sharing Environment [J]. IEEE ACCESS, 2017, 5 : 20260 - 20271
- [47] Efficient Computation Method of Participants' Weights in Shamir's Secret Sharing [J]. SECURITY WITH INTELLIGENT COMPUTING AND BIG-DATA SERVICES, 2020, 895 : 598 - 605
- [48] A 256 Bit Implementation of ECC-RFID Based System using Shamir Secret Sharing Scheme and Keccak Hash Function [J]. 2017 NINTH INTERNATIONAL CONFERENCE ON UBIQUITOUS AND FUTURE NETWORKS (ICUFN 2017), 2017, : 165 - 171
- [49] Unconditionally secure proactive secret sharing scheme with combinatorial structures [J]. SELECTED AREAS IN CRYPTOGRAPHY, PROCEEDINGS, 2000, 1758 : 200 - 214
- [50] A secure and efficient secret sharing scheme with general access structures [J]. FUZZY SYSTEMS AND KNOWLEDGE DISCOVERY, PROCEEDINGS, 2006, 4223 : 646 - 649