Author of the publication

Multi-Secret Sharing Schemes.

, , , , and . CRYPTO, volume 839 of Lecture Notes in Computer Science, page 150-163. Springer, (1994)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Evangelism in Social Networks: Algorithms and Complexity., , , and . CoRR, (2016)Optimizing Spread of Influence in Weighted Social Networks via Partial Incentives., , , and . CoRR, (2015)Hardness, approximability, and exact algorithms for vector domination and total vector domination in graphs, , and . CoRR, (2010)Generalized Framework for Selectors with Applications in Optimal Group Testing., , and . ICALP, volume 2719 of Lecture Notes in Computer Science, page 81-96. Springer, (2003)A New Kind of Selectors and Their Applications to Conflict Resolution in Wireless Multichannels Networks., and . ALGOSENSORS, volume 10050 of Lecture Notes in Computer Science, page 45-61. Springer, (2016)Optimal Two-Stage Algorithms for Group Testing Problems., , and . SIAM J. Comput., 34 (5): 1253-1270 (2005)Graph Decompositions and Secret Sharing Schemes., , , and . J. Cryptol., 8 (1): 39-64 (1995)Highly Fault-Tolerant Routing in the Star and Hypercube Interconnection Networks., and . Parallel Process. Lett., 8 (2): 221-230 (1998)A Fast Algorithm for the Unique Decipherability of Multivalued Encodings., , and . Theor. Comput. Sci., 134 (1): 63-78 (1994)Bounds on the Entropy of a Function of a Random Variable and Their Applications., , and . IEEE Trans. Inf. Theory, 64 (4): 2220-2230 (2018)