Entry Blundo:1996:FDS from tcs1995.bib
Last update: Sun Oct 15 02:56:11 MDT 2017
Top |
Symbols |
Numbers |
Math |
A |
B |
C |
D |
E |
F |
G |
H |
I |
J |
K |
L |
M |
N |
O |
P |
Q |
R |
S |
T |
U |
V |
W |
X |
Y |
Z
BibTeX entry
@Article{Blundo:1996:FDS,
author = "Carlo Blundo and Antonella Cresti and Alfredo De
Santis and Ugo Vaccaro",
title = "Fully dynamic secret sharing schemes",
journal = j-THEOR-COMP-SCI,
volume = "165",
number = "2",
pages = "407--440",
day = "10",
month = oct,
year = "1996",
CODEN = "TCSCDI",
ISSN = "0304-3975 (print), 1879-2294 (electronic)",
ISSN-L = "0304-3975",
bibdate = "Mon Jul 19 22:20:16 MDT 1999",
bibsource = "http://www.elsevier.com/cgi-bin/cas/tree/store/tcs/cas_free/browse/browse.cgi?year=1996&volume=165&issue=2;
http://www.math.utah.edu/pub/tex/bib/tcs1995.bib",
URL = "http://www.elsevier.com/cgi-bin/cas/tree/store/tcs/cas_sub/browse/browse.cgi?year=1996&volume=165&issue=2&aid=2206",
acknowledgement = ack-nhfb,
classification = "B6120B (Codes); C6130S (Data security)",
corpsource = "Dipartimento di Inf. ed Applicazioni, Salerno Univ.,
Italy",
fjournal = "Theoretical Computer Science",
journal-URL = "http://www.sciencedirect.com/science/journal/03043975/",
keywords = "access structure; broadcast message; cryptography;
fully dynamic; randomness; secret sharing schemes;
security",
pubcountry = "Netherlands",
treatment = "T Theoretical or Mathematical",
}
Related entries
- access,
141(1)283,
143(1)73,
154(2)283,
155(2)349,
162(2)245,
175(2)393,
188(1)1,
196(1)3,
196(1)109,
196(1)259,
196(1)289
- B6120B,
144(1)161,
145(1)345,
147(1)165,
148(2)227,
154(2)283,
163(1)145,
163(1)259,
164(1)223,
181(2)337,
182(1)245,
188(1)231,
197(1)246
- Blundo, Carlo,
154(2)283
- broadcast,
147(1)69,
200(1)313
- C6130S,
154(2)283,
181(2)317,
191(1)173
- code,
141(1)1,
144(1)161,
145(1)345,
147(1)165,
148(2)227,
148(2)325,
154(2)283,
155(2)425,
159(1)103,
160(1)145,
162(2)297,
163(1)145,
163(1)259,
164(1)223,
172(1)309,
176(1)337,
181(2)337,
182(1)245,
183(1)3,
187(1)231,
188(1)231,
191(1)117,
192(2)201,
196(1)347,
196(1)365,
197(1)246,
204(1)11,
215(1)345,
218(1)107
- Cresti, Antonella,
209(1)87
- cryptography,
154(2)283,
181(2)317
- dynamic,
138(1)211,
140(2)205,
140(2)319,
142(1)59,
144(1)125,
151(1)125,
158(1)233,
161(1)109,
162(2)341,
164(1)165,
165(2)441,
166(1)173,
167(1)235,
168(2)461,
169(2)161,
174(1)203,
175(2)225,
184(1)195,
186(1)199,
190(2)115,
192(2)201,
194(1)242-1,
195(1)3,
199(1)145,
216(1)109,
217(1)157,
229(1)41
- fully,
138(2)315,
149(2)201,
151(1)207,
154(2)379,
156(1)177,
168(1)155,
170(1)445,
176(1)205,
179(1)217,
185(2)259,
197(1)241,
228(1)105
- message,
138(2)315,
147(1)69,
151(1)195,
169(1)39,
192(2)201,
195(2)291,
196(1)71,
198(1)99
- randomness,
145(1)391,
172(1)195,
207(1)245,
207(2)263
- Santis, Alfredo De,
154(2)283,
156(1)315
- schemes,
154(2)283,
160(1)1,
186(1)171,
188(1)221,
190(1)61,
196(1)131,
200(1)313,
205(1)115,
226(1)173
- secret,
154(2)283
- security,
153(1)3,
154(2)283,
181(2)317,
191(1)173
- sharing,
139(1)163,
146(1)69,
151(2)487,
154(2)283,
155(1)141,
197(1)241,
227(1)99
- Vaccaro, Ugo,
154(2)283