On Secret Reconstruction in Secret Sharing Schemes | IEEE Journals & Magazine | IEEE Xplore