Login / Signup
On using probabilistic Turing machines to model participants in cryptographic protocols.
Lee Klingler
Rainer Steinwandt
Dominique Unruh
Published in:
Theor. Comput. Sci. (2013)
Keyphrases
</>
probabilistic model
formal model
privacy preserving
real time