Login / Signup
Secure distributed membership tests via secret sharing: How to hide your hostile hosts: Harnessing shamir secret sharing.
David John Zage
Helen Xu
Thomas M. Kroeger
Bridger Hahn
Nolan P. Donoghue
Thomas R. Benson
Published in:
ICNC (2016)
Keyphrases
</>
secret sharing
secret sharing scheme
multi party
electronic voting
visual cryptography scheme
mobile agents
distributed systems
privacy preserving
key management
encryption scheme
multi agent
data streams
secret image
digital images
lightweight
post processing