<--- Back to Details
First PageDocument Content
Cryptography / Public-key cryptography / Communications protocol / Data transmission / Digital signature / Short Message Service / Adversary / Peer-to-peer / Secure multi-party computation
Date: 2006-03-28 14:11:04
Cryptography
Public-key cryptography
Communications protocol
Data transmission
Digital signature
Short Message Service
Adversary
Peer-to-peer
Secure multi-party computation

A Game-Theoretic Framework for Analyzing Trust-Inference Protocols∗ Ruggero Morselli† Jonathan Katz†

Add to Reading List

Source URL: zoo.cs.yale.edu

Download Document from Source Website

File Size: 176,54 KB

Share Document on Facebook

Similar Documents

The Multiplicative Quantum Adversary ∗ ˇ Robert Spalek

The Multiplicative Quantum Adversary ∗ ˇ Robert Spalek

DocID: 1vbp5 - View Document

Transcripts – Bankruptcy and Adversary  Docketing Event  Bankruptcy/Adversary > Notices > Notice of Intent to Request Redaction of Transcript  Bankruptcy/Adversary > Miscellaneous > Statement of Personal Data Ide

Transcripts – Bankruptcy and Adversary Docketing Event  Bankruptcy/Adversary > Notices > Notice of Intent to Request Redaction of Transcript  Bankruptcy/Adversary > Miscellaneous > Statement of Personal Data Ide

DocID: 1v7TI - View Document

Oft Target Tor adversary models that don’t miss the mark 1.  Aaron D. Jaggard

Oft Target Tor adversary models that don’t miss the mark 1. Aaron D. Jaggard

DocID: 1uUjm - View Document

Developing Simulated Cyber-Attack Scenarios Against Virtualized Adversary Networks Luis Aybar, Gurminder Singh and Alan Shaffer Naval Postgraduate School, Monterey, USA

Developing Simulated Cyber-Attack Scenarios Against Virtualized Adversary Networks Luis Aybar, Gurminder Singh and Alan Shaffer Naval Postgraduate School, Monterey, USA

DocID: 1uBiR - View Document

Active Adversary Lecture 7 CCA Security  MAC

Active Adversary Lecture 7 CCA Security MAC

DocID: 1uhlN - View Document