Login / Signup
ThreshoWeb Security and Data Managementld Signature Scheme Based on Modular Secret Sharing.
Qi Xie
Zhonghua Shen
Xiuyuan Yu
Published in:
CIS (2) (2008)
Keyphrases
</>
data sources
data points
image data
secret sharing
signature scheme
dimensionality reduction
data integrity
digital signature scheme