Login / Signup
Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion).
Erinn Atwater
Ian Goldberg
Published in:
Security Protocols Workshop (2018)
Keyphrases
</>
secret sharing
secret sharing scheme
encryption scheme
multi party
visual cryptography scheme
mobile devices
face recognition
high frequency
image reconstruction
embedded systems
key management