共 50 条
- [21] SECURITY OF AUDIO SECRET SHARING SCHEME ENCRYPTING AUDIO SECRETS WITH BOUNDED SHARES [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH AND SIGNAL PROCESSING (ICASSP), 2014,
- [23] Visual secret sharing for multiple secrets [J]. PATTERN RECOGNITION, 2008, 41 (12) : 3572 - 3581
- [24] Proactive Secret Sharing Scheme Suitable for Asymmetric Secret Sharing Scheme [J]. 2016 IEEE 5TH GLOBAL CONFERENCE ON CONSUMER ELECTRONICS, 2016,
- [25] Multi secret sharing scheme using iterative method [J]. JOURNAL OF INFORMATION & OPTIMIZATION SCIENCES, 2018, 39 (03): : 631 - 641
- [26] Verifiable Rational Multi-secret Sharing Scheme [J]. INFORMATION COMPUTING AND APPLICATIONS, PT II, 2011, 244 : 42 - 48
- [27] A practical verifiable multi-secret sharing scheme [J]. COMPUTER STANDARDS & INTERFACES, 2007, 29 (01) : 138 - 141
- [28] Verifiable threshold multi-secret sharing scheme [J]. Harbin Gongye Daxue Xuebao/Journal of Harbin Institute of Technology, 2008, 40 (09): : 1462 - 1465
- [29] A Hierarchical Threshold Multi-secret Sharing Scheme [J]. 2008 2ND INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY AND IDENTIFICATION, 2008, : 231 - 234
- [30] A (t, n) multi-secret sharing scheme [J]. APPLIED MATHEMATICS AND COMPUTATION, 2004, 151 (02) : 483 - 490