12.07.2015 Views

Algorytmy transformacji wielomianowych i ich zastosowania

Algorytmy transformacji wielomianowych i ich zastosowania

Algorytmy transformacji wielomianowych i ich zastosowania

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

BibliografiaTassa, T. (2007). Hierarchical threshold secret sharing. Journal of Cryptology,20 (2), 237––264.Tompa, M. i Woll, H. (1998). How to share a secret with cheaters. Journal ofCryptology, 1 , 133––138.Tzeng, W. i Tzeng, H. (2005). A public-key traitor tracing scheme with revocationusing dynamic shares. Designs, Codes and Cryptography, 35 , 47––61.von zur Gathen, J. i Gerhard, J. (2003). Modern Computer Algebra. Cambridge:University Press.Wirth, N. (2001). <strong>Algorytmy</strong> + struktury danych = programy. Warszawa: WydawnictwoNaukowo-Techniczne. Tytuł oryginału: Algorithms + Data Structures =Programs.Zhang, Y. i Liu, Z. (2007). Dynamic and verifiable secret sharing among weightedparticipants. Journal of Systems Science and Complexity, 20 (4), 481 – 485.Zhao, R., Zhao, J., Dai, F., i Zhao, F. (2009). A new image secret sharing schemeto identify cheaters. Computer Standards & Interfaces, 31 , 252––257.Zwierko, A. i Kotulski, Z. (2006). An efficient agent e-voting system with distributedtrust. [w] M. H. ter Beek i F. Gadducci (Red.), Proceedings of VODCA 2006,Second International Workshop on Views On Designing Complex Architectures.Bertinoro, Italy, 85 – 101.Zwierko, A. i Kotulski, Z. (2007). A light-weight e-voting system with distributedtrust. Electronic Notes in Theoretical Computer Science, 168 , 109––126.92

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!