Login / Signup
Randomized Component and Its Application to (t, m, n)-Group Oriented Secret Sharing.
Fuyou Miao
Yan Xiong
Xingfu Wang
Moaman Badawy
Published in:
IEEE Trans. Inf. Forensics Secur. (2015)
Keyphrases
</>
secret sharing
secret sharing scheme
multi party
visual cryptography scheme
high quality
wireless sensor networks
key management
secret image