![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Author: Hofmeister T. Krause M. Simon H.U.
Publisher: Elsevier
ISSN: 0304-3975
Source: Theoretical Computer Science, Vol.240, Iss.2, 2000-06, pp. : 471-485
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
New visual secret sharing schemes using probabilistic method
By Yang C.-N.
Pattern Recognition Letters, Vol. 25, Iss. 4, 2004-03 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Fully dynamic secret sharing schemes
By Blundo C. Cresti A. De Santis A. Vaccaro U.
Theoretical Computer Science, Vol. 165, Iss. 2, 1996-10 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
On the information rate of secret sharing schemes
By Blundo C. De Santis A. Gargano L. Vaccaro U.
Theoretical Computer Science, Vol. 154, Iss. 2, 1996-02 ,pp. :
![](/images/ico/ico_close.png)
![](/images/ico/ico5.png)
Visual Secret Sharing Without Pixel Expansion
International Journal of Digital Crime and Forensics (IJDCF), Vol. 7, Iss. 2, 2015-04 ,pp. :