{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,10]],"date-time":"2024-09-10T04:46:21Z","timestamp":1725943581175},"reference-count":17,"publisher":"Oxford University Press (OUP)","issue":"1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006,1,1]]},"DOI":"10.1093\/comjnl\/bxh152","type":"journal-article","created":{"date-parts":[[2005,12,2]],"date-time":"2005-12-02T01:13:38Z","timestamp":1133486018000},"page":"97-107","source":"Crossref","is-referenced-by-count":178,"title":["Probabilistic Visual Cryptography Schemes"],"prefix":"10.1093","volume":"49","author":[{"given":"S.","family":"Cimato","sequence":"first","affiliation":[]},{"given":"R.","family":"De Prisco","sequence":"additional","affiliation":[]},{"given":"A.","family":"De Santis","sequence":"additional","affiliation":[]}],"member":"286","published-online":{"date-parts":[[2005,12,1]]},"reference":[{"key":"key\n\t\t\t\t20171011222947_B1","doi-asserted-by":"crossref","unstructured":"Naor, M. and Shamir, A. (1994) Visual cryptography. In Proc. Eurocrypt 94, Perugia, Italy, May 9\u201312, LNCS950, pp. 1\u201312. Springer Verlag.","DOI":"10.1007\/BFb0053419"},{"key":"key\n\t\t\t\t20171011222947_B2","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R. (1996) Constructions and bounds for visual cryptography. In Proc. ICALP 1996, Paderbon, Germany, July 8\u201312, LNCS1099, pp. 416\u2013428. Springer Verlag.","DOI":"10.1007\/3-540-61440-0_147"},{"key":"key\n\t\t\t\t20171011222947_B3","doi-asserted-by":"crossref","unstructured":"Blundo, C., D'Arco, P., De Santis, A. and Stinson, D. R. (2003) Contrast optimal threshold visual cryptography schemes. SIAM J. Discrete Math., 16, 224\u2013261","DOI":"10.1137\/S0895480198336683"},{"key":"key\n\t\t\t\t20171011222947_B4","doi-asserted-by":"crossref","unstructured":"Blundo, C., De Bonis, A. and De Santis, A. (2001) Improved schemes for visual cryptography. Design. Code. Cryptogr., 24, 255\u2013278","DOI":"10.1023\/A:1011271120274"},{"key":"key\n\t\t\t\t20171011222947_B5","doi-asserted-by":"crossref","unstructured":"Blundo, C., De Santis, A. and Stinson, D. R. (1999) On the contrast in visual cryptography schemes. J. Cryptol., 12, 261\u2013289","DOI":"10.1007\/s001459900057"},{"key":"key\n\t\t\t\t20171011222947_B6","doi-asserted-by":"crossref","unstructured":"Hofmeister, T., Krause, M. and Simon, H. U. (2000) Contrast-optimal k out of n secret sharing schemes in visual cryptography. Theor. Comput. Sci., 240, 471\u2013485","DOI":"10.1016\/S0304-3975(99)00243-1"},{"key":"key\n\t\t\t\t20171011222947_B7","doi-asserted-by":"crossref","unstructured":"Krause, M. and Simon, H. U. (2003) Determining the optimal contrast for secret sharing schemes in visual cryptography. Comb. Probab. Comput., 12, 285\u2013299","DOI":"10.1017\/S096354830200559X"},{"key":"key\n\t\t\t\t20171011222947_B8","unstructured":"Kuhlmann, C. and Simon, H. U. (2000) Construction of visual secret sharing schemes with almost optimal contrast. In Proc. 11th ACM-SIAM Symp. Discrete Algorithms, San Francisco, USA, January 9\u201311, pp. 262\u2013272, SIAM."},{"key":"key\n\t\t\t\t20171011222947_B9","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R. (1996) Visual cryptography for general access structures. Inform. Comput., 129, 86\u2013106","DOI":"10.1006\/inco.1996.0076"},{"key":"key\n\t\t\t\t20171011222947_B10","doi-asserted-by":"crossref","unstructured":"Ateniese, G., Blundo, C., De Santis, A. and Stinson, D. R. (2001) Extended schemes for visual cryptography. Theor. Comput. Sci., 250, 143\u2013161","DOI":"10.1016\/S0304-3975(99)00127-9"},{"key":"key\n\t\t\t\t20171011222947_B11","doi-asserted-by":"crossref","unstructured":"Yang, C.-N. and Chen, T.-S. (2005) Aspect ratio invariant visual secret sharing schemes with minimum pixel expansion. Pattern Recog. Lett., 26, 193\u2013206","DOI":"10.1016\/j.patrec.2004.08.025"},{"key":"key\n\t\t\t\t20171011222947_B12","unstructured":"Cimato, S., De Prisco, R. and De Santis, A. (2004) Colored visual cryptography without color darkening. In Proc. 4th Conf. Security in Communication Networks, Amalfi, Italy, September 8\u201310, LNCS3352, pp. 236\u2013251. Springer Verlag."},{"key":"key\n\t\t\t\t20171011222947_B13","doi-asserted-by":"crossref","unstructured":"Cimato, S., De Prisco, R. and De Santis, A. (2005) Optimal colored threshold visual cryptography schemes. Design. Code. Cryptogr., 35, 311\u2013335","DOI":"10.1007\/s10623-003-6741-z"},{"key":"key\n\t\t\t\t20171011222947_B14","doi-asserted-by":"crossref","unstructured":"Verheul, E. R. and van Tilborg, H. C. A. (1997) Constructions and properties of k out of n visual secret sharing schemes. Design. Code. Cryptogr., 11, 179\u2013196","DOI":"10.1023\/A:1008280705142"},{"key":"key\n\t\t\t\t20171011222947_B15","doi-asserted-by":"crossref","unstructured":"Yang, C.-N. and Laih, C.-S. (2000) New colored visual secret sharing schemes. Design. Code. Cryptogr., 20, 325\u2013335","DOI":"10.1023\/A:1008382327051"},{"key":"key\n\t\t\t\t20171011222947_B16","doi-asserted-by":"crossref","unstructured":"Yang, C.-N. (2004) New visual secret sharing schemes using probabilistic method. Pattern Recogn. Lett., 25, 481\u2013494","DOI":"10.1016\/j.patrec.2003.12.011"},{"key":"key\n\t\t\t\t20171011222947_B17","doi-asserted-by":"crossref","unstructured":"Yang, C.-N. and Chen, T.-S. (2005) Size-adjustable visual secret sharing schemes. IEICE Trans. Fund. Electr., Commun. Comput. Sci., E88-A, 2471\u20132474.","DOI":"10.1093\/ietfec\/e88-a.9.2471"}],"container-title":["The Computer Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/academic.oup.com\/comjnl\/article-pdf\/49\/1\/97\/1162074\/bxh152.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,11]],"date-time":"2020-04-11T09:05:20Z","timestamp":1586595920000},"score":1,"resource":{"primary":{"URL":"http:\/\/academic.oup.com\/comjnl\/article\/49\/1\/97\/419064\/Probabilistic-Visual-Cryptography-Schemes"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,12,1]]},"references-count":17,"journal-issue":{"issue":"1","published-online":{"date-parts":[[2005,12,1]]},"published-print":{"date-parts":[[2006,1,1]]}},"URL":"https:\/\/doi.org\/10.1093\/comjnl\/bxh152","relation":{},"ISSN":["1460-2067","0010-4620"],"issn-type":[{"value":"1460-2067","type":"electronic"},{"value":"0010-4620","type":"print"}],"subject":[],"published-other":{"date-parts":[[2006,1]]},"published":{"date-parts":[[2005,12,1]]}}}