共 12 条
[1]
Chen Qin, 2011, Application Research of Computers, V28, P318, DOI 10.3969/j.issn.1001-3695.2011.01.089
[2]
Chen Yu-ling, 2008, Computer Engineering and Design, V29, P5430
[3]
Fu Zhengxin, 2009, COMPUTER TECHNOLOGY, P539
[4]
Han Yanyan, 2009, STUDY VISUAL CRYPTOG
[5]
Naor M., 1994, Workshop on the theory and application of of cryptographic techniques, P1, DOI [DOI 10.1007/BFB0053419, 10.1007/BFb0053419, DOI 10.1007/978-1-4939-9484-7_1]
[6]
Wang Beniian, 2009, INFORM ELECT ENG, V7, p[339, 365]
[7]
Wang Yiwei, 2008, COMPUTER TECHNOLOGY, P492
[8]
Xu Xiaohui, 2007, CHEATER DETECTABLE V, P1335
[9]
Yan Hao, 2004, Journal of Shanghai Jiaotong University, V38, P107
[10]
Multi-secret sharing threshold visual cryptography scheme
[J].
CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS,
2007,
:815-+