Access control and signatures via quorum secret sharing | IEEE Journals & Magazine | IEEE Xplore