Login / Signup
Towards Continuous Authentication in Internet of Things Based on Secret Sharing Scheme.
Omaimah Omar Bamasag
Kamal Youcef-Toumi
Published in:
WESS (2015)
Keyphrases
</>
secret sharing scheme
authentication mechanism
secret sharing
key management
visual cryptography
black and white
key technologies
visual cryptography scheme
encryption scheme
secret image
video sequences
digital images
mobile devices
denoising
low cost
security analysis