Shatter: Using Threshold Cryptography to Protect Single Users with Multiple Devices

Erinn Atwater, Urs Hengartner. Shatter: Using Threshold Cryptography to Protect Single Users with Multiple Devices. In Matthias Hollick, Panos Papadimitratos, William Enck, editors, Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WISEC 2016, Darmstadt, Germany, July 18-22, 2016. pages 91-102, ACM, 2016. [doi]

@inproceedings{AtwaterH16,
  title = {Shatter: Using Threshold Cryptography to Protect Single Users with Multiple Devices},
  author = {Erinn Atwater and Urs Hengartner},
  year = {2016},
  doi = {10.1145/2939918.2939932},
  url = {http://doi.acm.org/10.1145/2939918.2939932},
  researchr = {https://researchr.org/publication/AtwaterH16},
  cites = {0},
  citedby = {0},
  pages = {91-102},
  booktitle = {Proceedings of the 9th ACM Conference on Security & Privacy in Wireless and Mobile Networks, WISEC 2016, Darmstadt, Germany, July 18-22, 2016},
  editor = {Matthias Hollick and Panos Papadimitratos and William Enck},
  publisher = {ACM},
  isbn = {978-1-4503-4270-4},
}