Sign in

Incentive-driven attacker for corrupting two-party protocols.

Yilei WangRoberto MetereHuiyu ZhouGuanghai CuiTao Li
Published in: Soft Comput. (2018)
Keyphrases
  • data driven
  • fair exchange protocols
  • key agreement protocol
  • database
  • real time
  • digital libraries
  • game theory
  • mechanism design
  • application level
  • communication protocol
  • adverse selection