Login / Signup
Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage.
Lukasz Krzywiecki
Marcin Slowik
Published in:
SECITC (2017)
Keyphrases
</>
authentication protocol
theorem proving
anomaly detection