Return to Article Details Reducing the level of message compromise in information transmission systems to virtual private clouds using Shamir's scheme Download Download PDF