Sign Up to like & get
recommendations!
0
Published in 2020 at "Arabian Journal for Science and Engineering"
DOI: 10.1007/s13369-020-04422-9
Abstract: Sensitive information used online has resulted in the emergence of many security systems to be protected by secret keys. One of these security systems is the so-called secret sharing, in which certain key portions are…
read more here.
Keywords:
based secret;
target;
secret sharing;
number ... See more keywords