Threshold visual secret sharing based on Boolean operations
Article first published online: 17 MAY 2013
Copyright © 2013 John Wiley & Sons, Ltd.
Security and Communication Networks
Volume 7, Issue 3, pages 653–664, March 2014
How to Cite
Kumar, S. and Sharma, R. K. (2014), Threshold visual secret sharing based on Boolean operations. Security Comm. Networks, 7: 653–664. doi: 10.1002/sec.769
- Issue published online: 19 FEB 2014
- Article first published online: 17 MAY 2013
- Manuscript Accepted: 11 FEB 2013
- Manuscript Revised: 31 JAN 2013
- Manuscript Received: 22 MAY 2012
Options for accessing this content:
- Login via other institutional login options http://onlinelibrary.wiley.com/login-options.
- You can purchase online access to this Article for a 24-hour period (price varies by title)
- New Users: Please register, then proceed to purchase the article.
Registered Users please login:
- Access your saved publications, articles and searches
- Manage your email alerts, orders and subscriptions
- Change your contact information, including your password
Please register to:
- Save publications, articles and searches
- Get email alerts
- Get all the benefits mentioned below!