Login / Signup
Defensive strategies against PCC attacks based on ideal (t,n)-secret sharing scheme.
Sijjad Ali
Jia Wang
Victor Chung Ming Leung
Published in:
J. King Saud Univ. Comput. Inf. Sci. (2023)
Keyphrases
</>
secret sharing scheme
secret sharing
key management
visual cryptography scheme
encryption scheme
black and white
image processing
high frequency