共 21 条
- [1] [Anonymous], 2006, INF TECHN AUT ID DAT
- [2] Beimel Amos, 2011, Coding and Cryptology. Proceedings of the Third International Workshop, IWCC 2011, P11, DOI 10.1007/978-3-642-20901-7_2
- [3] Chow YW, 2016, EXPLOITING ERROR COR
- [5] Naor M., 1999, LNCS, V950, P1
- [6] Saito K, 2011, TECH REPORT IEICE IS, V111, P79
- [7] Snyder A. J, 2012, PATTERN RECOGNIT LET, V34, P283
- [8] Wan S, 2016, 9 EAI INT W IN PRESS
- [9] Two secret sharing schemes based on Boolean operations [J]. PATTERN RECOGNITION, 2007, 40 (10) : 2776 - 2785
- [10] On general construction for extended visual cryptography schemes [J]. PATTERN RECOGNITION, 2009, 42 (11) : 3071 - 3082