共 20 条
[2]
[Anonymous], 2002, CRYPTOGRAPHY THEORY
[4]
Blakley G.R., 1979, P 1979 AFIPS NAT COM, V48, P313, DOI [10.1109/MARK.1979.8817296, DOI 10.1109/MARK.1979.8817296]
[7]
Sharing secret images using shadow codebooks
[J].
INFORMATION SCIENCES,
1998, 111 (1-4)
:335-345
[8]
A time varying filtering theory for constrained traffic regulation and dynamic service guarantees
[J].
IEEE INFOCOM '99 - THE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-3, PROCEEDINGS: THE FUTURE IS NOW,
1999,
:63-70
[9]
Hernández-Encinas L, 2002, 6TH WORLD MULTICONFERENCE ON SYSTEMICS, CYBERNETICS AND INFORMATICS, VOL I, PROCEEDINGS, P471