Login / Signup
A Cryptographic Escrow for Treaty Declarations and Step-by-Step Verification.
Sébastien Philippe
Alexander Glaser
Edward W. Felten
Published in:
CoRR (2018)
Keyphrases
</>
cryptographic protocols
intellectual property
high assurance
third party
smart card
model checking
hash functions
face verification
formal analysis
security properties
case study
neural network
key management
formal verification
person identification