共 27 条
[1]
Blakley GR, 1979, P AFIPS NEW YORK NY, P313, DOI DOI 10.1109/MARK.1979.8817296
[3]
Chattopadhyay AK, 2018, 2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), P1025, DOI 10.1109/UEMCON.2018.8796568
[4]
Cungui Liang, 2019, 2019 IEEE 4th Advanced Information Technology, Electronic and Automation Control Conference (IAEAC), P2628, DOI 10.1109/IAEAC47372.2019.8998001
[5]
Dautrich JL, 2012, LECT NOTES COMPUT SC, V7371, P145, DOI 10.1007/978-3-642-31540-4_12
[6]
Di Crescenzo G, 2001, LECT NOTES COMPUT SC, V2136, P292
[7]
Study on Secret Sharing for SM2 Digital Signature and Its Application
[J].
2018 14TH INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY (CIS),
2018,
:205-209
[8]
On the Applicability of Secret Share Algorithms for Saving Data on IoT, Edge and Cloud Devices
[J].
2019 INTERNATIONAL CONFERENCE ON INTERNET OF THINGS (ITHINGS) AND IEEE GREEN COMPUTING AND COMMUNICATIONS (GREENCOM) AND IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING (CPSCOM) AND IEEE SMART DATA (SMARTDATA),
2019,
:14-21
[9]
Big MRI Data Dissemination and Retrieval in a Multi-Cloud Hospital Storage System
[J].
PROCEEDINGS OF THE 2017 INTERNATIONAL CONFERENCE ON DIGITAL HEALTH (DH'17),
2017,
:162-166
[10]
Galletta A, 2017, IEEE SYMP COMP COMMU, P94, DOI 10.1109/ISCC.2017.8024511