共 5 条
[1]
[Anonymous], 1994, WORKSHOP THEORY APPL, DOI 10.1007/BFb0053419
[2]
Cimato S., 2011, DIGITAL IMAGING COMP
[3]
Liu F., 2014, VISUAL CRYPTOGRAPHY, DOI [10.1007/978-3-319-09644-5, DOI 10.1007/978-3-319-09644-5]
[4]
Naor M., 1997, Security Protocols. International Workshop Proceedings, P197
[5]
VERNAM G.S., 1926, T AM I ELECT ENG, VXLV, DOI [DOI 10.1109/JAIEE.1926.6534724, 10.1109/T-AIEE.1926.5061224, DOI 10.1109/T-AIEE.1926.5061224]