Login / Signup

Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries.

M. V. N. Ashwin KumarK. SrinathanC. Pandu Rangan
Published in: ACISP (2002)
Keyphrases
  • standard model
  • database
  • neural network
  • database systems
  • wireless sensor networks
  • user authentication
  • asynchronous communication