Login / Signup
Message Transmission with Reverse Firewalls - Secure Communication on Corrupted Machines.
Yevgeniy Dodis
Ilya Mironov
Noah Stephens-Davidowitz
Published in:
IACR Cryptol. ePrint Arch. (2015)
Keyphrases
</>
secure communication
message transmission
network security
smart card
secret sharing
secret key
key management
public key
computer networks
ad hoc networks
digital signature
security protocols
intrusion detection system
key technologies
chaotic systems
intrusion detection
response time
web services
load balancing