Login / Signup
Unconditionally secure social secret sharing scheme.
Mehrdad Nojoumian
Douglas R. Stinson
Morgan Grainger
Published in:
IET Inf. Secur. (2010)
Keyphrases
</>
secret sharing scheme
secret sharing
key management
encryption scheme
authentication mechanism
multi party
visual cryptography
visual cryptography scheme
resource constrained
wireless sensor networks
ad hoc networks
response time
black and white
multiresolution
image data
image quality