Towards Attack and Defense Views to (t, n)-threshold Secret Sharing Scheme Using Information Theory | IEEE Conference Publication | IEEE Xplore