Shatter Secrets: Using Secret Sharing to Cross Borders with Encrypted Devices (Transcript of Discussion)
Part of the Lecture Notes in Computer Science book series (LNCS, volume 11286)
- 323 Downloads
This article is a curated transcription of the discussion that took place at the workshop when the author presented the paper.
© Springer Nature Switzerland AG 2018