APPENDICE C

Bibliografia

[1] G. Ateniese, C. Blundo, A. De Santis, e D. R. Stinson, Constructions and Bounds for Visual Cryptography in "23rd International Colloquium on Automata, Languages and Programming" (ICALP '96), F. M. auf der Heide e B. Monien Eds., Vol. 1099 of "Lecture Notes in Computer Science", Springer-Verlag, Berlino, pp. 416-428. 1996.

[2] G. Ateniese, C. Blundo, A. De Santis, e D. R. Stinson, Visual Cryptography for General Access Structures Information and Computation, Vol. 129, No. 2, (1996), pp. 86-106.

[3] G. Ateniese, C. Blundo, A. De Santis, e D. R. Stinson, Extended Schemes for Visual Cryptography sottomesso a Theoretical Computer Science.

[4] C. Blundo, A. De Santis, e D. R. Stinson, On the Contrast in Visual Cryptography Schemes Journal of Cryptology, accepted for publication. Available also at Theory of Cryptography Library, n. 96-13.

[5] C. Blundo, P. D'Arco, A. De Santis, and D. R. Stinson, Contrast Optimal Threshold Visual Cryptography Schemes sottomesso.

[6] S. Droste, New Results on Visual Cryptography in "Advances in Cryptology - CRYPTO '96", N. Koblitz Ed., Vol. 1109 of "Lecture Notes in Computer Science", Springer-Verlag, Berlino, pp. 401-415, 1996.

[7] T. Hofmeister, M. Krause e H. U. Simon, Contrast-optimal k out of n Secret Sharing Schemes in Visual Cryptography COCOON '97, T. Jiang e D. T. Lee, Eds., Vol. 1276 of "Lecture Notes in Computer Science", Springer-Verlag, Berlino, 1997.

[8] M. Naor e A. Shamir, Visual Cryptography in "Advances in Cryptology - EUROCRYPT '94", A. De Santis Ed., Vol. 950 of Lecture Notes in Computer Science, Springer-Verlag, Berlino, pp. 1-12, 1995.

[9] M. Naor and A. Shamir, Visual Cryptography II: Improving the Contrast via the Cover Base presented at "Security in Communication Networks", 16-17 Settembre, 1996, Amalfi, Italy. Disponibile anche in Theory of Cryptography Library come Technical Re- port N.7. Una versione preliminare appare in "Security Protocols", M. Lomas Ed., Vol. 1189 of Lecture Notes in Computer Science, Springer-Verlag, Berlino, pp. 197-202, 1997.

[10] M. Naor e Benny Pinkas, Visual Authentication, in "Advances in Cryptology - CRYPTO '97", B. Kaliski Jr. Ed., Vol. 1294 of "Lecture Notes in Computer Science" Springer- Verlag, Berlino, pp. 322-336, 1997.

[11] Douglas R. Stinson, An Introduction to Visual Cryptography presentato a "Public Key Solutions '97", 28-30 Aprile, 1997, Toronto, Canada.

[12] Douglas R. Stinson, Visual Cryptography & Threshold Schemes Dr. Dobb's Journal, Aprile 1998.

[13] E.R. Verheul e H.C.A. van Tilborg, Constructions and Properties of k out of n visual secret sharing schemes, Designs, Codes and Cryptography, Vol. 11, 1997, pp. 179-196.