Yixiong Chen, Weichuan Fang
Engineering Analysis with Boundary Elements
This paper demonstrates that Shamir's scheme [10] is not secure against certain forms of cheating. A small modification to his scheme retains the security and efficiency of the original, is secure against these forms of cheating, and preserves the property that its security does not depend on any unproven assumptions such as the intractability of computing number-theoretic functions. © 1988 International Association for Cryptologic Research.
Yixiong Chen, Weichuan Fang
Engineering Analysis with Boundary Elements
Juliann Opitz, Robert D. Allen, et al.
Microlithography 1998
David W. Jacobs, Daphna Weinshall, et al.
IEEE Transactions on Pattern Analysis and Machine Intelligence
W.F. Cody, H.M. Gladney, et al.
SPIE Medical Imaging 1994