Cited By
View all- Gunaratne JBernheim Brush AMynatt EFitzpatrick GHudson SEdwards KRodden T(2010)NewportProceedings of the SIGCHI Conference on Human Factors in Computing Systems10.1145/1753326.1753379(343-352)Online publication date: 10-Apr-2010
Application and desktop sharing allows sharing of any application with one or more people over the Internet. The participants receive the screen-view of the shared application from the server. Their mouse and keyboard events are delivered and ...
A threshold secret sharing scheme permits a secret to be shared among participants in such a way that only qualified subsets of participants can recover the secret. Threshold secret sharing is useful in management of cryptographic keys. Based on ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in