Secret Sharing Deniable Encryption Technique.
Mohsen Mohamad HataFakariah Hani Mohd AliSyed Ahmad AljunidPublished in: ICISA (2017)
Keyphrases
- secret sharing
- authentication protocol
- encryption scheme
- security analysis
- secret sharing scheme
- public key
- secret key
- key management
- visual cryptography scheme
- security protocols
- smart card
- hash functions
- visual cryptography
- signature scheme
- lightweight
- multi party
- security requirements
- rfid tags
- peer to peer
- feature extraction