Login / Signup
Perfect Secret Sharing Schemes on Five Participants.
Wen-Ai Jackson
Keith M. Martin
Published in:
Des. Codes Cryptogr. (1996)
Keyphrases
</>
secret sharing scheme
secret sharing
multi party
key management
real time
response time