Login / Signup
How secret-sharing can defeat terrorist fraud.
Gildas Avoine
Cédric Lauradoux
Benjamin Martin
Published in:
WISEC (2011)
Keyphrases
</>
secret sharing
money laundering
secret sharing scheme
terrorist activities
fraud detection
multi party
criminal activities
social network analysis
visual cryptography scheme
law enforcement
terrorist networks
image processing
web services
natural images
key management
secret image