共 22 条
- [1] [Anonymous], LNCS
- [2] A MODULAR APPROACH TO KEY SAFEGUARDING [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 208 - 210
- [3] Bellare M., 1995, P 1 ACM C COMPUTER C, P62
- [4] Blakley G., 1979, P AFIPS NAT COMP C
- [5] Boudot F, 1999, LECT NOTES COMPUT SC, V1726, P87
- [6] CHAUM D, 1988, LECT NOTES COMPUT SC, V304, P127
- [7] Cramer R., 2000, ACM Transactions on Information and Systems Security, V3, P161, DOI 10.1145/357830.357847
- [8] de Santis A., 1994, Proceedings of the Twenty-Sixth Annual ACM Symposium on the Theory of Computing, P522, DOI 10.1145/195058.195405
- [9] DESMEDT Y, 1992, LECT NOTES COMPUT SC, V576, P457
- [10] DESMEDT Y, 1990, LECT NOTES COMPUT SC, V435, P307