Login / Signup
Feasibility and Infeasibility of Secure Computation with Malicious PUFs.
Dana Dachman-Soled
Nils Fleischhacker
Jonathan Katz
Anna Lysyanskaya
Dominique Schröder
Published in:
CRYPTO (2) (2014)
Keyphrases
</>
malicious attacks
information systems
cloud computing
feasible solution
security issues