Login / Signup
Secure Two-Party Computation over a Z-Channel.
Paolo Palmieri
Olivier Pereira
Published in:
ProvSec (2011)
Keyphrases
</>
covert channel
security requirements
data sets
multi channel
security issues
authentication scheme
multiple access
key agreement protocol
security mechanisms
security analysis
scalar product
method invocation