[1. Armbrust, M.. A. Fo x, R. Griffith, A. Joseph, R. Katz, A. Konwinsk i, G. Lee, D. Patterso n, A. Rabkin, I. Stoica, M. Zahari a. Above the Clouds: A Berkeley View of Cloud Computing. Technical Report No UCB/EECS-2009-28, University of California at Berkley, USA, 10 February, 2009.]Search in Google Scholar
[2. Buyy a, R., C. S. Ye o, S. Venugopa l, J. Brober g, I. Brandi c. Cloud Computing and Emerging IT Platforms: Vision, Hype, and Reality for Delivering Computing as the 5th Utility. - In: Future Generation Computer Systems. Amsterdam, The Netherlands, Elsevier Science, 2009.]Search in Google Scholar
[3. Kaufma n, L. M. Data Security in the World of Cloud Computing. - IEEE Security and Privacy, Vol. 7, 2009, No 4, pp. 61-64.10.1109/MSP.2009.87]Search in Google Scholar
[4. Mell, P., T. Grance. Effectively and Securely Using the Cloud Computing Paradigm. NIST, Information Technology Laboratory, 2009.]Search in Google Scholar
[5. Naor, M., A. Shamir. Visual Cryptography. - In: Proc. of Advance in Cryptology- EUROCRYPT’94. - In: Lecture Notes in Computer Science. Vol. 950. Springer-Verlag, 1995, pp. 1-12.]Search in Google Scholar
[6. Blundo, C., A. De Santis, D. R. Stinso n. On the Contrast in Visual Cryptography Schemes. - J. Cryptol.: J. Int. Assoc. Cryptol. Res., Vol. 12, 1999, No 4, pp. 261-289.10.1007/s001459900057]Search in Google Scholar
[7. Blundo, C., P. D’Arco, A. De Santis, D. R. Stinso n. Contrast Optimal Threshold Visual Cryptography Schemes. - SIAM J. Discrete Math., Vol. 16, 2003, No 2, pp. 224-261.10.1137/S0895480198336683]Search in Google Scholar
[8. Hofmeister, T., M. Krause, H. U. Simo n. Contrast-Optimalkout ofn Secret Sharing Schemes in Visual Cryptography. - Theoretical Computer Science., Vol. 240, Jun 2000, No 2, pp. 471-485.10.1016/S0304-3975(99)00243-1]Search in Google Scholar
[9. Ateniese, G., C. Blundo, A. De Santis, D. R. Stinso n. Visual Cryptography for General Access Structures. - Inf. Comput., Vol. 129, September 1996, No 2, pp. 86-106.10.1006/inco.1996.0076]Search in Google Scholar
[10. Yang, C. N. New Visual Secret Sharing Schemes Using Probabilistic Method. - Pattern Recognition Letter, Vol. 25, 2004, pp. 481-494.10.1016/j.patrec.2003.12.011]Search in Google Scholar
[11. Ho u, Y.-C. Visual Cryptography for Color Images. - Pattern Recognition, Vol. 36, 2003, pp. 1619-1629.10.1016/S0031-3203(02)00258-3]Search in Google Scholar
[12. Lee, K.-H., P.-L. Chiu. An Extended Visual Cryptography Algorithm for General Access Structures. - IEEE Transactions on Information Forensics and Security, Vol. 7, 2012, No 1, pp. 219-229.10.1109/TIFS.2011.2167611]Search in Google Scholar
[13. Chen, S.-K. A Visual Cryptography Based System for Sharing Multiple Secret Images. - In: ISCGAV’07. - In: Proc. of 7th World Scientific and Engineering Academy and Society (WSEAS) International Conference on Signal Processing, Computational Geometry and Artificial Vision, Stevens Point, Wisconsin, USA, 2007, pp. 117-122.]Search in Google Scholar
[14. Feng, J.-B., H.-C. Wu, C.-S. Tsai, Y.-F. Chan g, Y.-P. Ch u. Visual Secret Sharing for Multiple Secrets. - Pattern Recognition, Vol. 41, 2008, Issue 12, pp. 3572-3581.10.1016/j.patcog.2008.05.031]Search in Google Scholar
[15. Yang, C.-N., T.-S. Chen. Size-Adjustable Visual Secret Sharing Schemes. - IEICE Transactions 88-A(9), 2005, pp. 2471-2474.10.1093/ietfec/e88-a.9.2471]Search in Google Scholar
[16. Yang, C.-N., T.-S. Chen. New Size-Reduced Visual Secret Sharing Schemes with Half Reduction of Shadow Size. - IEICE Transactions 89-A(2), 2006, pp. 620-625.10.1093/ietfec/e89-a.2.620]Search in Google Scholar
[17. Yang, C.-N., T.-S. Chen. Extended Visual Secret Sharing Schemes: Improving the Shadow Image Quality. - IJPRAI, Vol. 21, 2007, No 5, pp. 879-898.10.1142/S0218001407005740]Search in Google Scholar
[18. Jaafar, A. M., A. Samsudin. A New Public-Key Encryption Scheme Based on Non- Expansion Visual Cryptography and Boolean Operation. - IJCSI International Journal of Computer Science Issues, Vol. 7, July 2010, Issue 4, No 2, pp. 1-10. ]Search in Google Scholar