共 50 条
- [21] Robust Computational Secret Sharing and a Unified Account of Classical Secret-Sharing Goals CCS'07: PROCEEDINGS OF THE 14TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2007, : 172 - +
- [25] The access structure of some secret-sharing schemes INFORMATION SECURITY AND PRIVACY: 1ST AUSTRALASIAN CONFERENCE, ACISP 96, 1996, 1172 : 67 - 78
- [27] How Secret-sharing can Defeat Terrorist Fraud WISEC 11: PROCEEDINGS OF THE FOURTH ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2011, : 145 - 155
- [28] Secret-Sharing: Interactions Between a Child, Robot, and Adult 2011 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2011, : 2489 - 2494
- [29] Secret-Sharing Hardware Improves the Privacy of Network Monitoring DATA PRIVACY MANAGEMENT AND AUTONOMOUS SPONTANEOUS SECURITY, 2011, 6514 : 51 - 63
- [30] Entropic inequalities for a class of quantum secret-sharing states PHYSICAL REVIEW A, 2011, 83 (04):