Login / Signup

Where's Alice?: Applied Kid Crypto Meets Provable Security.

Ryan HenryAlyssa TorySophie HenryIsabella HenrySamantha Henry
Published in: WPES@CCS (2020)
Keyphrases
  • information security
  • security protocols
  • information systems
  • real time
  • data sets
  • approximation algorithms
  • encryption algorithm