

Author: Jackson Wen-Ai Martin Keith
Publisher: Springer Publishing Company
ISSN: 0925-1022
Source: Designs, Codes and Cryptography, Vol.9, Iss.3, 1996-11, pp. : 267-286
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content










Hierarchical Threshold Secret Sharing
By Tassa Tamir
Journal of Cryptology, Vol. 20, Iss. 2, 2007-04 ,pp. :