Login / Signup
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries.
Yonatan Aumann
Yehuda Lindell
Published in:
TCC (2007)
Keyphrases
</>
semi honest
security protocols
real life
privacy preserving
access control
information flow
security requirements
cryptographic protocols
communication protocols
database
neural network
social networks
decision making
security properties
security problems
provably secure