Login / Signup

Defensive strategies against PCC attacks based on ideal (t,n)-secret sharing scheme.

Sijjad AliJia WangVictor Chung Ming Leung
Published in: J. King Saud Univ. Comput. Inf. Sci. (2023)
Keyphrases
  • secret sharing scheme
  • secret sharing
  • key management
  • visual cryptography scheme
  • encryption scheme
  • black and white
  • image processing
  • high frequency