Login / Signup
Authentication as A Service Based on Shamir Secret Sharing.
Andrea Bissoli
Fabrizio d'Amore
Published in:
ISCSIC (2021)
Keyphrases
</>
secret sharing
secret sharing scheme
visual cryptography scheme
multi party
web services
key management
visual cryptography
secret image
co occurrence
low cost
black and white
image data
resource constrained
encryption scheme