Publication | Closed Access
Detection and identification of cheaters in (t, n) secret sharing scheme
85
Citations
8
References
2009
Year
EngineeringInformation SecurityInformation LeakageInformation HidingData PrivacyInformation ForensicsSecure CommunicationComputer ScienceCovert ChannelData SecurityCryptographyCryptanalysis
| Year | Citations | |
|---|---|---|
Page 1
Page 1