Author of the publication

Optimal (k, n) visual cryptographic schemes for general k.

, and . Des. Codes Cryptogr., 55 (1): 19-35 (2010)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Key Predistribution Schemes for Distributed Sensor Networks, , and . CoRR, (2011)Union Distinct Families Of Sets, With An Application To Cryptography., and . Ars Comb., (2013)Some Results Related to Permanental Inequalities., and . Electron. Notes Discret. Math., (2003)Optimal main effect plans in blocks and related nested row-column designs., and . Electron. Notes Discret. Math., (2003)Applications of Partially Balanced Incomplete Block Designs in Developing (2, n) Visual Cryptographic Schemes., , , and . IEICE Trans. Fundam. Electron. Commun. Comput. Sci., 90-A (5): 949-951 (2007)Optimal (k, n) visual cryptographic schemes for general k., and . Des. Codes Cryptogr., 55 (1): 19-35 (2010)Key predistribution schemes for distributed sensor networks via block designs., , and . Des. Codes Cryptogr., 67 (1): 111-136 (2013)Replacement sort revisited: The "gold standard" unearthed!, , , and . Appl. Math. Comput., 189 (1): 384-394 (2007)Optimal crossover designs when carryover effects are proportional to direct effects, and . Journal of Statistical Planning and Inference, 137 (11): 3291--3302 (Nov 1, 2007)Sample-size-restrictive adaptive sampling: an application in estimating localized elements, , and . Journal of Statistical Planning and Inference, 134 (1): 254--267 (Sep 1, 2005)