Login / Signup
Abuse Reporting for Metadata-Hiding Communication Based on Secret Sharing.
Saba Eskandarian
Published in:
IACR Cryptol. ePrint Arch. (2023)
Keyphrases
</>
secret sharing
metadata
multi party
secret sharing scheme
digital libraries
visual cryptography scheme
databases
privacy preserving
information sharing
business intelligence
co occurrence
wireless networks
embedded systems