Inductive Proofs of Computational Secrecy
From MaRDI portal
Publication:3521245
DOI10.1007/978-3-540-74835-9_15zbMath1477.68034OpenAlexW1603876738MaRDI QIDQ3521245
John C. Mitchell, Ante Derek, Arnab Roy, Anupam Datta
Publication date: 21 August 2008
Published in: Computer Security – ESORICS 2007 (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-540-74835-9_15
Applications of game theory (91A80) Network protocols (68M12) Authentication, digital signatures and secret sharing (94A62) Computer security (68M25)
Related Items (1)
This page was built for publication: Inductive Proofs of Computational Secrecy