Login / Signup
Robust and Simple N-Party Entangled Authentication Cloud Storage Protocol Based on Secret Sharing Scheme.
Hongfeng Zhu
Tianhua Liu
Dan Zhu
Haiyang Li
Published in:
J. Inf. Hiding Multim. Signal Process. (2013)
Keyphrases
</>
secret sharing scheme
secret sharing
cloud storage
multi party
response time
cloud computing
end to end
authentication protocol