1 |
T. Beth, D. Jungnickel, and H. Lenz, “Design theory,” Cambridge Univ. Press, 1993.
|
2 |
J. Benaloh and J. Letchter, “Generalized secret sharing and monotone functions,” Advances in Cryptography-Proc. of Crypto'88, Notes Comp. Science, pp.27-35, 1990.
DOI
|
3 |
D. R. Hughes and F. C. Piper, “Design theory,” Cambridge Univ. Press, Cambidge, 1985.
|
4 |
A. Shamir, “How to share secret,” Comm. of the ACM, 22, pp.612-613, 1979.
DOI
ScienceOn
|
5 |
J. Kurihara, S. Kiyomoto, K. Fukushima, and T. Tanaka, “On a Fast (k,n)-Threshold Secret Sharing Scheme,” IEICE Trans. Fundamentals, Vol.E91-A, No.9, pp.2365-2377, Jan., 2008.
DOI
ScienceOn
|
6 |
C. Cachin, “On-line Secret Sharing," Cryptography and Coding, LNCS Vol.1025, pp.190-198, 2005.
DOI
|
7 |
Raghu Rmakrishnan, “Sherpa: Cloud Computing of the Third Kind," Data- Intensive Computing Symposium, 2008.
|
8 |
Jeff Dean, “Handling Large Datasets at Google: Current Systems and Future Directions," Data-Intensive Computing Symposium, 2008.
|
9 |
M. Ito, A. Saito, and T. Nishizeki, “Secret sharing scheme realizing general access structure,” In Proceedings of the IEEE Global Communication Conference, 1987.
|
10 |
A. Subbiah and D. M. Blough, “An approach for fault tolerant and secure data storage in collaborative work environements,” In Proc. of the 2005 ACM Workshop on Storage Security and Survivabiilty, pp.84-93, Nov., 2005.
DOI
|