Login / Signup
Authentication as a service: Shamir Secret Sharing with byzantine components.
Andrea Bissoli
Fabrizio d'Amore
Published in:
CoRR (2018)
Keyphrases
</>
secret sharing
secret sharing scheme
multi party
visual cryptography scheme
fault tolerant
key management
secret image
web services
visual cryptography
resource constrained