Analysis of Three (k, n) Secret Sharing Methods and Development of a (4, n) Method with Valid Participant Authentication, Error Detection, and 100% Repairing of Multiple Damages

EMU I-REP

Files in this item

This item appears in the following Collection(s)