Login / Signup

Dynamic access policies for unconditionally secure secret sharing schemes.

Keith M. Martin
Published in: ICITS (2005)
Keyphrases
  • secret sharing scheme
  • secret sharing
  • key management
  • wireless sensor networks
  • ground truth
  • motion estimation
  • denoising