@dblp

A (2, 3) Threshold Secret Sharing Scheme Using Sudoku.

, , , and . IIH-MSP, page 43-46. IEEE Computer Society, (2010)

Links and resources

Tags