Applied Cryptography and Network Security
From MaRDI portal
Publication:5899233
DOI10.1007/11767480zbMATH Open1151.94634OpenAlexW4211109874MaRDI QIDQ5899233FDOQ5899233
Authors: Ching-Nung Yang, Chung-Chun Wang, T.-S. Chen
Publication date: 2 May 2007
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/11767480
Recommendations
Cryptography (94A60) Image processing (compression, reconstruction, etc.) in information and communication theory (94A08) Authentication, digital signatures and secret sharing (94A62)
Cited In (6)
- Topics in Cryptology – CT-RSA 2004
- Ideal contrast visual cryptography schemes with reversing
- Maximal contrast color visual secret sharing schemes
- MTVSS: (M)isalignment (T)olerant (V)isual (S)ecret (S)haring on resolving alignment difficulty
- Information Security
- Reduce shadow size in aspect ratio invariant visual secret sharing schemes using a square block-wise operation
This page was built for publication: Applied Cryptography and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q5899233)