Perfect secret sharing scheme based on vertex domination set

Due to the fast development in data communication systems and computer networks in recent years, the necessity to protect the secret data has become extremely imperative. Several methods have been proposed to protect the secret data; one of them is the secret sharing scheme. It is a method of distri...

Full description

Bibliographic Details
Main Authors: Al-Saidi, Nadia Mohammed Ghanim, Rajab, N. A., Md. Said, Mohamad Rushdan, Kadhim, K. A.
Format: Article
Language:English
Published: Taylor and Francis 2015
Online Access:http://psasir.upm.edu.my/id/eprint/45803/1/RANK.pdf