Login / Signup
Asynchronous Perfectly Secure Computation Tolerating Generalized Adversaries.
M. V. N. Ashwin Kumar
K. Srinathan
C. Pandu Rangan
Published in:
ACISP (2002)
Keyphrases
</>
standard model
database
neural network
database systems
wireless sensor networks
user authentication
asynchronous communication