Login / Signup

On using probabilistic Turing machines to model participants in cryptographic protocols.

Lee KlinglerRainer SteinwandtDominique Unruh
Published in: Theor. Comput. Sci. (2013)
Keyphrases
  • probabilistic model
  • formal model
  • privacy preserving
  • real time