Login / Signup

ThreshoWeb Security and Data Managementld Signature Scheme Based on Modular Secret Sharing.

Qi XieZhonghua ShenXiuyuan Yu
Published in: CIS (2) (2008)
Keyphrases
  • data sources
  • data points
  • image data
  • secret sharing
  • signature scheme
  • dimensionality reduction
  • data integrity
  • digital signature scheme