Login / Signup
Secure Computation Protocols Using Polarizing Cards.
Kazumasa Shinagawa
Takaaki Mizuki
Jacob C. N. Schuldt
Koji Nuida
Naoki Kanayama
Takashi Nishide
Goichiro Hanaoka
Eiji Okamoto
Published in:
IEICE Trans. Fundam. Electron. Commun. Comput. Sci. (2016)
Keyphrases
</>
cryptographic protocols
key distribution
security protocols
key exchange
key agreement protocol
multi party
authentication protocol
security properties
database systems
security requirements
application level
communication protocols
key exchange protocol
covert channel