Login / Signup
Overcoming security limitations of Secret Share techniques: the Nested Secret Share.
Antonino Galletta
Javid Taheri
Maria Fazio
Antonio Celesti
Massimo Villari
Published in:
TrustCom (2021)
Keyphrases
</>
intrusion detection
information systems
data mining
hierarchical structure
network security
security issues
secret sharing scheme
data sets
learning algorithm
case study
secret sharing
visual cryptography
information assurance