Login / Signup
Exchanging Secrets without Using Cryptography
Mahdi Jafari Siavoshani
U. Pulleti
Emre Atsan
Iris Safaka
Christina Fragouli
Katerina J. Argyraki
Suhas N. Diggavi
Published in:
CoRR (2011)
Keyphrases
</>
cellular automata
information security
asked questions
data sets
sensitive information
search engine optimization
information retrieval
metadata
public key cryptography
encryption algorithms