Secure Two-party Protocols for Point Inclusion Problem.
Tony ThomasPublished in: Int. J. Netw. Secur. (2009)
Keyphrases
- key agreement protocol
- cryptographic protocols
- authentication protocol
- key distribution
- security protocols
- key exchange
- key management
- multi party
- secure multiparty computation
- authenticated key agreement
- application level
- neural network
- security services
- security properties
- fair exchange protocols
- semi honest
- provably secure
- sample points
- security requirements
- smart card
- trusted third party
- key establishment