Achieving Secure and Reliable UAV Authentication: A Shamir's Secret Sharing Based Approach.
Gaurang BansalBiplab SikdarPublished in: IEEE Trans. Netw. Sci. Eng. (2024)
Keyphrases
- secret sharing
- secret sharing scheme
- secure communication
- authentication mechanism
- key management
- electronic voting
- visual cryptography scheme
- multi party
- key distribution
- encryption scheme
- authentication scheme
- security analysis
- visual cryptography
- secret image
- user authentication
- cost effective
- privacy preserving
- black and white
- response time
- factor authentication
- high quality