Login / Signup
Scalable and Secure Computation Among Strangers: Resource-Competitive Byzantine Protocols.
John Augustine
Valerie King
Anisur Rahaman Molla
Gopal Pandurangan
Jared Saia
Published in:
CoRR (2019)
Keyphrases
</>
cryptographic protocols
security protocols
key distribution
fault tolerant
key exchange
multi party
key agreement protocol
security services
resource allocation
highly efficient
authentication protocol
private information retrieval
resource management
application level
group communication
key establishment