Login / Signup

Secure distributed membership tests via secret sharing: How to hide your hostile hosts: Harnessing shamir secret sharing.

David John ZageHelen XuThomas M. KroegerBridger HahnNolan P. DonoghueThomas R. Benson
Published in: ICNC (2016)
Keyphrases