Login / Signup
Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices.
Erinn Atwater
Ian Goldberg
Published in:
Security Protocols Workshop (2018)
Keyphrases
</>
secret sharing
secret sharing scheme
encryption scheme
multi party
visual cryptography scheme
mobile devices
key management
secret image
image processing
feature extraction
high quality
digital images
image compression