Login / Signup

Coding Theorems for a (2, 2)-Threshold Scheme With Detectability of Impersonation Attacks.

Mitsugu IwamotoHiroki KogaHirosuke Yamamoto
Published in: IEEE Trans. Inf. Theory (2012)
Keyphrases