共 50 条
- [22] Participants Increasing for Shamir's Polynomial-based Secret Image Sharing Scheme 2017 IEEE 3RD INTERNATIONAL CONFERENCE ON BIG DATA SECURITY ON CLOUD (BIGDATASECURITY, IEEE 3RD INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE AND SMART COMPUTING, (HPSC) AND 2ND IEEE INTERNATIONAL CONFERENCE ON INTELLIGENT DATA AND SECURITY (IDS), 2017, : 32 - 36
- [23] Security limitations of Shamir's secret sharing JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (04): : 977 - 989
- [24] Secret Sharing Scheme with Efficient Cheating Detection PROCEEDINGS OF THE 2ND INTERNATIONAL CONFERENCE ON NETWORKING, INFORMATION SYSTEMS & SECURITY (NISS19), 2019,
- [25] An Efficient Halftone Visual Secret Sharing Scheme 2014 9TH INTERNATIONAL CONFERENCE ON INDUSTRIAL AND INFORMATION SYSTEMS (ICIIS), 2014, : 70 - 74
- [26] Cloud Computing Security in Multi-clouds using Shamir's Secret Sharing Scheme 2016 INTERNATIONAL CONFERENCE ON ELECTRICAL, ELECTRONICS, AND OPTIMIZATION TECHNIQUES (ICEEOT), 2016, : 392 - 395
- [28] Research and Application Based on A. Shamir's (t, n) Threshold Secret Sharing Scheme PROCEEDINGS OF 2012 7TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION, VOLS I-VI, 2012, : 671 - 674
- [29] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme EURASIP JOURNAL ON ADVANCES IN SIGNAL PROCESSING, 2010,
- [30] On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme EURASIP Journal on Advances in Signal Processing, 2010