Login / Signup
MPC vs. SFE : Unconditional and Computational Security.
Martin Hirt
Ueli M. Maurer
Vassilis Zikas
Published in:
ASIACRYPT (2008)
Keyphrases
</>
access control
intrusion detection
information security
closed loop
network security
security issues
security mechanisms
computer security
information systems
security policies
functional requirements
security level
computational power
security systems
security problems