Inproceedings,

Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion).

, and .
Security Protocols Workshop, volume 11286 of Lecture Notes in Computer Science, page 295-303. Springer, (2018)

Meta data

Tags

Users

  • @dblp

Comments and Reviews