Login / Signup

Secure Two-Party Computation over a Z-Channel.

Paolo PalmieriOlivier Pereira
Published in: ProvSec (2011)
Keyphrases
  • covert channel
  • security requirements
  • data sets
  • multi channel
  • security issues
  • authentication scheme
  • multiple access
  • key agreement protocol
  • security mechanisms
  • security analysis
  • scalar product
  • method invocation