Login / Signup
Information-Theoretically Secure Protocols and Security under Composition.
Eyal Kushilevitz
Yehuda Lindell
Tal Rabin
Published in:
SIAM J. Comput. (2010)
Keyphrases
</>
security level
information security
security requirements
intrusion detection
privacy preserving
security issues
user privacy
privacy concerns
sensitive data
security protocols
authentication protocol
security properties
group communication
secure multiparty computation
factor authentication