Login / Signup
On the composable security of weak coin flipping.
Jiawei Wu
Yanglin Hu
Akshay Bansal
Marco Tomamichel
Published in:
CoRR (2024)
Keyphrases
</>
information security
security policies
security issues
intrusion detection
security systems
real time
network security
security requirements
security problems
statistical databases
credit card
security level
key agreement protocol
security properties
security mechanisms
human operators
operating system
case study