Incentive-driven attacker for corrupting two-party protocols (2018)
Abstract
No abstract provided
Bibliographic Information
Digital Object Identifier: http://dx.doi.org/10.1007/s00500-018-3342-3
Publication URI: http://dx.doi.org/10.1007/s00500-018-3342-3
Type: Journal Article/Review
Parent Publication: Soft Computing
Issue: 23