"Incentive-driven attacker for corrupting two-party protocols."

Yilei Wang et al. (2018)

Details and statistics

DOI: 10.1007/S00500-018-3342-3

access: open

type: Journal Article

metadata version: 2024-08-08