共 50 条
- [41] Linear (k, n) secret sharing scheme with cheating detection [J]. CIT/IUCC/DASC/PICOM 2015 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY - UBIQUITOUS COMPUTING AND COMMUNICATIONS - DEPENDABLE, AUTONOMIC AND SECURE COMPUTING - PERVASIVE INTELLIGENCE AND COMPUTING, 2015, : 1943 - 1948
- [42] (k,n) secret image sharing scheme capable of cheating detection [J]. EURASIP Journal on Wireless Communications and Networking, 2018
- [44] A Cheating Model for Cellular Automata-Based Secret Sharing Schemes [J]. PROCEEDINGS OF WORLD ACADEMY OF SCIENCE, ENGINEERING AND TECHNOLOGY, VOL 25, 2007, 25 : 306 - +
- [45] A Ramp Threshold Secret Sharing Scheme against Cheating by Substitution Attacks [J]. PROCEEDINGS OF 2016 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS (ISITA 2016), 2016, : 340 - 344
- [47] Cheating identifiable (k, n) threshold quantum secret sharing scheme [J]. Quantum Information Processing, 2022, 21
- [49] Cheating identifiable polynomial based secret sharing scheme for audio and image [J]. Multimedia Tools and Applications, 2024, 83 : 403 - 423
- [50] Cheating detection and cheater identification in (t, n) secret sharing scheme [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2014, 29 (01): : 87 - 93