Sign in

An approach to enhance inter-provider roaming through secret sharing and its application to WLANs.

Ulrike MeyerJared CordascoSusanne Wetzel
Published in: WMASH (2005)
Keyphrases
  • secret sharing
  • secret sharing scheme
  • multi party
  • visual cryptography scheme
  • encryption scheme
  • image processing
  • web services
  • wireless networks
  • description language
  • key management
  • visual cryptography