Login / Signup
On the vulnerability of a Group Key Transfer protocol based on secret sharing.
Ruxandra F. Olimid
Published in:
SACI (2014)
Keyphrases
</>
secret sharing
secure communication
multi party
secret sharing scheme
electronic voting
visual cryptography scheme
lightweight
video sequences
smart card
encryption scheme