Login / Signup
Malicious Clients in Distributed Secret Sharing Based Storage Networks.
Andreas Happe
Stephan Krenn
Thomas Lorünser
Published in:
Security Protocols Workshop (2016)
Keyphrases
</>
secret sharing
multi party
wide area network
secret sharing scheme
distributed systems
multi agent
visual cryptography scheme
web services
database systems
network nodes
video sequences
digital images
data management
peer to peer
privacy preserving
visual cryptography