Login / Signup
Incentive-driven attacker for corrupting two-party protocols.
Yilei Wang
Roberto Metere
Huiyu Zhou
Guanghai Cui
Tao Li
Published in:
Soft Comput. (2018)
Keyphrases
</>
data driven
fair exchange protocols
key agreement protocol
database
real time
digital libraries
game theory
mechanism design
application level
communication protocol
adverse selection