Login / Signup
Flow-limited authorization for consensus, replication, and secret sharing.
Priyanka Mondal
Maximilian Algehed
Owen Arden
Published in:
J. Comput. Secur. (2023)
Keyphrases
</>
secret sharing
secret sharing scheme
access control
multi party
visual cryptography scheme
face recognition
image sequences
preprocessing
motion estimation
sensor networks
image quality
autonomous agents