Article Comments

Contributions from readers on our articles are very welcome. This form will let us retrieve the current data in the database and allows us to consider your comments.

Security analysis and improvement of two verifiable multi-secret sharing schemes
Jia Yu; Rong Hao; Xiangguo Cheng
International Journal of Security and Networks (IJSN), 2013 Vol.8 No.4, pp.200 - 206
14 + 20 =

Thank you for your feedback.