共 16 条
[1]
Ateniese G., 1996, LNCS, V1099, P416
[2]
BEGUIN P, 1995, LECT NOTES COMPUTER, V921, P194
[4]
Blakley G. R., 1980, Proceedings of the 1980 Symposium on Security and Privacy, P108
[5]
Blakley G. R., 1979, 1979 International Workshop on Managing Requirements Knowledge (MARK), P313, DOI 10.1109/MARK.1979.8817296
[7]
Charnes C., 1995, Australian Computer Science Communications, V17, P61
[8]
DESMEDT Y, 1990, LECT NOTES COMPUT SC, V435, P307
[9]
HANG N, 2007, COMPUTER, V40, P52
[10]
Ideal secret sharing schemes with multiple secrets
[J].
JOURNAL OF CRYPTOLOGY,
1996, 9 (04)
:233-250