Sign in

Strongly Deniable Identification Schemes Immune to Prover's and Verifier's Ephemeral Leakage.

Lukasz KrzywieckiMarcin Slowik
Published in: SECITC (2017)
Keyphrases
  • authentication protocol
  • theorem proving
  • anomaly detection