Login / Signup

Towards wireless security without computational assumptions - An oblivious transfer protocol based on an unauthenticated wireless channel.

Zhuo HaoSheng ZhongErran L. Li
Published in: INFOCOM (2011)
Keyphrases