Login / Signup
Where's Alice?: Applied Kid Crypto Meets Provable Security.
Ryan Henry
Alyssa Tory
Sophie Henry
Isabella Henry
Samantha Henry
Published in:
WPES@CCS (2020)
Keyphrases
</>
information security
security protocols
information systems
real time
data sets
approximation algorithms
encryption algorithm