Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries.
Yonatan AumannYehuda LindellPublished in: IACR Cryptol. ePrint Arch. (2007)
Keyphrases
- semi honest
- security protocols
- information security
- network security
- cost effective
- security policies
- secure multiparty computation
- key agreement protocol
- bounded rationality
- provably secure
- communication protocols
- statistical databases
- information systems
- privacy preserving
- wireless sensor networks
- real life
- web services