Login / Signup
Impossibility bounds for secure computing.
Himanshu Tyagi
Shun Watanabe
Published in:
ISIT (2015)
Keyphrases
</>
lower bound
upper bound
worst case
upper and lower bounds
authentication scheme
error bounds
average case
security analysis
machine learning
security issues
security requirements
standard model
group communication