秘密分散 (Japanese Wikipedia)

Analysis of information sources in references of the Wikipedia article "秘密分散" in Japanese language version.

refsWebsite
Global rank Japanese rank
2nd place
6th place
1st place
1st place
699th place
4,621st place
11th place
1,537th place
1,185th place
2,667th place
332nd place
925th place
4,653rd place
low place
5,990th place
low place

acm.org

dl.acm.org

cornell.edu

cs.cornell.edu

doi.org

  • Shamir, Adi (1 November 1979). “How to share a secret”. Communications of the ACM 22 (11): 612–613. doi:10.1145/359168.359176. オリジナルの2017-08-10時点におけるアーカイブ。. https://web.archive.org/web/20170810232803/http://cs.jhu.edu/~sdoshi/crypto/papers/shamirturing.pdf. 
  • Blakley, G.R. (1979). “Safeguarding Cryptographic Keys”. Managing Requirements Knowledge, International Workshop on (AFIPS) 48: 313–317. doi:10.1109/AFIPS.1979.98. https://pdfs.semanticscholar.org/32d2/1ccc21a807627fcb21ea829d1acdab23be12.pdf. 
  • Blakley, G.B.; Meadows, C. Security of Ramp Schemes. CRYPTO 1984. pp. 242–268. doi:10.1007/3-540-39568-7_20
  • Capocelli, R.M.; De Santis, A.; Gargano, L.; Vaccaro, U. On the size of shares for secret sharing schemes. Crypto '91. pp. 101–113. doi:10.1007/3-540-46766-1_7
  • Ogata, Wakaha; Kurosawa, Kaoru; Tsujii, Shigeo. Nonperfect secret sharing schemes. AUSCRYPT 1992. pp. 56–66. doi:10.1007/3-540-57220-1_52
  • Rabin, Michael O. (1989). “Efficient dispersal of information for security, load balancing, and fault tolerance”. Journal of the ACM 36 (2): 335–348. doi:10.1145/62044.62050. 

jhu.edu

cs.jhu.edu

semanticscholar.org

pdfs.semanticscholar.org

usenix.org

utk.edu

web.eecs.utk.edu

web.archive.org