共 22 条
- [1] Ahmadoh Esraa Mohammad, 2015, Lecture Notes on Information Theory, V3, P42, DOI 10.18178/lnit.3.1.42-47
- [2] A MODULAR APPROACH TO KEY SAFEGUARDING [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 208 - 210
- [3] Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
- [4] Fully dynamic secret sharing schemes [J]. THEORETICAL COMPUTER SCIENCE, 1996, 165 (02) : 407 - 440
- [5] Blundo C, 1993, P 1 FRENCH ISR WORKS, P19
- [6] Gutub A, 2003, 9 ANN GULF INT S KHO
- [7] Gutub A. A.-A., 2007, INT ARAB J INF TECHN, V4, P1
- [9] Gutub AA-A., 2010, INT J SECUR IJS, V4, P46