Author:
De Bonis Annalisa,De Santis Alfredo
Subject
General Computer Science,Theoretical Computer Science
Reference33 articles.
1. Visual cryptography for general access structures;Ateniese;Inform. and Comput.,1996
2. G. Ateniese, C. Blundo, A. De Santis, D.R. Stinson, Constructions and bounds for visual cryptography ICALP 1996, Lecture Notes in Computer Science, Vol. 1099, 1996, pp. 416–428.
3. Some recursive constructions for perfect hash families;Atici;J. Combin. Design,1996
4. Universally ideal secret sharing schemes;Beimel;IEEE Trans. Inform. Theory,1994
5. J. Benaloh, J. Leichter, Generalized secret sharing and monotone functions, Proc. Crypto ’88, Advances in Cryptology, Lecture Notes in Computer Science, Vol. 403, 1990, pp. 27–35.
Cited by
23 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Security issues in visual cryptography scheme with known random number sequence;Journal of King Saud University - Computer and Information Sciences;2024-03
2. Visual Cryptographic Shares Using Color Components;Handbook of Research on Thrust Technologies’ Effect on Image Processing;2023-06-30
3. Image Security Using Visual Cryptography;Advances in Computational Intelligence and Robotics;2022-10-21
4. An overview of visual cryptography techniques;Multimedia Tools and Applications;2021-07-21
5. On the Pixel Expansion of Visual Cryptography Scheme;Cryptography;2020