透過您的圖書館登入
IP:3.129.23.30

並列摘要


The work presents a new method for the design of ideal secret sharing. The method uses regular mappings that are well suited for construction of perfect secret sharing. The restriction of regular mappings to permutations gives a convenient tool for investigation of the relation between permutations and ideal secret sharing generated by them.

被引用紀錄


廖斐昭(2016)。地方感的研究與縫補─以台北大橋町為例〔碩士論文,淡江大學〕。華藝線上圖書館。https://doi.org/10.6846/TKU.2016.00075
洪家翔(2013)。基於快取B+樹機制改善加密資料庫查詢效能之研究〔碩士論文,元智大學〕。華藝線上圖書館。https://doi.org/10.6838/YZU.2013.00287
Lin, H. C. (2008). 具隱私權強化之數位簽章 [doctoral dissertation, National Central University]. Airiti Library. https://www.airitilibrary.com/Article/Detail?DocID=U0031-0207200917355134
Chang, S. C. (2013). 無線環境的認證方法及其在電子商務應用之研究 [doctoral dissertation, National Chung Cheng University]. Airiti Library. https://www.airitilibrary.com/Article/Detail?DocID=U0033-2110201613541599

延伸閱讀