共 13 条
[1]
Safeguarding Cryptographic Keys. Blakley G R. Proceedings of National Computer Conference, 1979, American Federation of Information Processing Societies . 1979
[2]
An Extended Verifiable Secret Redistribution Protocol for Archival Systems. V. Gupta,K. Gopinaph. First International Conference on Availability, Reliability and Security . 2006
[4]
How to withstand mobile virus attacks. Ostrovsky R,Yung M. Proceedings of the 10th Annual ACM Symposium on Principles of Distributed Computing (PODC) . 1991
[5]
Group-oriented (t, n) threshold digital signature scheme and digital multisignature. Harn L. IEE Proceedings-Computers and Digital Techniques . 1994
[6]
APSS:proactivesecret sharing in asynchronous systems. ZHOU Li-dong,SCHNEIDER F B,Van RENESSE R. ACM Trans on Informa-tion and Systems Security . 2005
[7]
A new authentica-tion scheme based on proactive verifiable secret sharing. HOU Zheng-feng,HAN Jiang-hong,HU Dong-hui. Proc ofInternetional Conference on Computer Science and Software Enginee-ring . 2008
[8]
A modular approach to key safeguarding. Asmuth C,Bloom J. IEEE Transactions on Information Theory . 1983