Login / Signup
Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries.
Yonatan Aumann
Yehuda Lindell
Published in:
J. Cryptol. (2010)
Keyphrases
</>
semi honest
real life
bounded rationality
intrusion detection
cost effective
information flow
communication protocols
privacy preserving
security protocols
access control
information security
key management
authentication protocol
security systems
cryptographic protocols
security properties