Login / Signup

Interactively Secure Groups from Obfuscation.

Thomas AgrikolaDennis Hofheinz
Published in: Public Key Cryptography (2) (2018)
Keyphrases
  • reverse engineering
  • key management
  • social networks
  • case study
  • cluster analysis
  • control flow
  • security protocols
  • malware detection