, Number of social network users worldwide from, pp.2019-2020, 2010.
Multiparty privacy in social media, Communications of the ACM, vol.61, issue.8, pp.74-81, 2018. ,
DOI : 10.1145/3208039
URL : http://dl.acm.org/ft_gateway.cfm?id=3208039&type=pdf
Safeguarding cryptographic keys, Proceedings of the National Computer Conference, vol.48, pp.313-317, 1979. ,
How to share a secret, Communications of the ACM, vol.22, issue.11, pp.612-613, 1979. ,
Secret image sharing, Computers & Graphics, vol.26, issue.5, pp.765-770, 2002. ,
How to (really) share a secret, Proceedings of the 8th Annual International Cryptology Conference on Advances in Cryptology, vol.88, pp.390-448, 1990. ,
DOI : 10.1007/0-387-34799-2_30
URL : https://link.springer.com/content/pdf/10.1007%2F0-387-34799-2_30.pdf
Disjunctive multi-level secret sharing, IACR Cryptology ePrint Archive, p.18, 2008. ,
Hierarchical threshold secret sharing, Journal of Cryptology, vol.20, issue.2, pp.237-264, 2007. ,
DOI : 10.1007/978-3-540-24638-1_26
URL : https://link.springer.com/content/pdf/10.1007%2F978-3-540-24638-1_26.pdf
A hierarchical threshold secret image sharing, Pattern Recognition Letters, vol.33, issue.1, pp.83-91, 2012. ,
Secret image sharing scheme with hierarchical threshold access structure, Journal of Visual Communication and Image Representation, vol.25, issue.5, pp.1093-1101, 2014. ,
DOI : 10.1016/j.jvcir.2014.03.004
Reducing shadow size in essential secret image sharing by conjunctive hierarchical approach, Signal Processing: Image Communication, vol.31, pp.1-9, 2015. ,
DOI : 10.1016/j.image.2014.11.003