Fairness in secure computing protocols based on incentives.
Yilei WangLeisi ChenHo-fung LeungChengyu HuBeijing ChenPublished in: Soft Comput. (2016)
Keyphrases
- cryptographic protocols
- key exchange
- security protocols
- key distribution
- authentication protocol
- multi party
- lightweight
- key establishment
- security properties
- fair exchange protocols
- neural network
- key agreement protocol
- communication protocol
- application level
- key management
- identity management
- security requirements
- security issues
- privacy preserving
- operating system