![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Tarmizi Seleviawati
Publisher: Springer Publishing Company
ISSN: 1000-9000
Source: Journal of Computer Science and Technology, Vol.26, Iss.4, 2011-07, pp. : 711-721
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Sharing one secret vs. sharing many secrets
Theoretical Computer Science, Vol. 295, Iss. 1, 2003-02 ,pp. :