Login / Signup

Randomized Component and Its Application to (t, m, n)-Group Oriented Secret Sharing.

Fuyou MiaoYan XiongXingfu WangMoaman Badawy
Published in: IEEE Trans. Inf. Forensics Secur. (2015)
Keyphrases
  • secret sharing
  • secret sharing scheme
  • multi party
  • visual cryptography scheme
  • high quality
  • wireless sensor networks
  • key management
  • secret image