Login / Signup
Security Against Honorific Adversaries: Efficient MPC with Server-aided Public Verifiability.
Li Duan
Yufan Jiang
Yong Li
Jörn Müller-Quade
Andy Rupp
Published in:
IACR Cryptol. ePrint Arch. (2022)
Keyphrases
</>
access control
security policies
security properties
intrusion detection
cost effective
third party
computer networks
closed loop
client server
network security
security requirements