Constructions and analysis of some efficient $$t$$ t - $$(k,n)^*$$ ( k , n ) ∗ -visual cryptographic schemes using linear algebraic techniques
Crossref DOI link: https://doi.org/10.1007/s10623-015-0075-5
Published Online: 2015-04-08
Published Print: 2016-07
Update policy: https://doi.org/10.1007/springer_crossmark_policy
Dutta, Sabyasachi
Rohit, Raghvendra Singh
Adhikari, Avishek
Text and Data Mining valid from 2015-04-08