Incentive-driven attacker for corrupting two-party protocols
Wang, Yilei, Metere, Roberto, Zhou, Huiyu, Cui, Guanghai, Li, TaoVolume:
22
Language:
english
Journal:
Soft Computing
DOI:
10.1007/s00500-018-3342-3
Date:
December, 2018
File:
PDF, 468 KB
english, 2018