Login / Signup
Perfectly Secure Message Transmission Tolerating Mixed Adversary.
Arpita Patra
Ashish Choudhury
B. V. Ashwinkumar
Kannan Srinathan
C. Pandu Rangan
Published in:
IACR Cryptol. ePrint Arch. (2008)
Keyphrases
</>
message transmission
security analysis
security issues
sensitive data
key management
authentication protocol
information extraction
response time
distributed systems
security requirements
security mechanisms