Login / Signup
Dependable Security by Twisted Secret Sharing.
Semir Daskapan
Published in:
SEC (2004)
Keyphrases
</>
secret sharing
electronic voting
secret sharing scheme
encryption scheme
key management
multi party
visual cryptography scheme
ground truth
secret image
digital images
resource constrained
visual cryptography
multiscale
multispectral
public key