Login / Signup
Choreographies with Secure Boxes and Compromised Principals
Marco Carbone
Joshua D. Guttman
Published in:
ICE (2009)
Keyphrases
</>
key management
user authentication
covert channel
security issues
real world
lightweight
multi party
security level
security mechanisms
scalar product
stream cipher
security properties
key distribution
real time
security requirements
neural network
databases