Back to Results
First PageMeta Content
Universal composability / Authentication protocol / Password authentication protocol / Secure multi-party computation / Integrated Windows Authentication / Authentication / Password / Man-in-the-middle attack / Kerberos / Cryptography / Cryptographic protocols / Security


Secure Computation Without Authentication∗ Boaz Barak† Ran Canetti‡ Yehuda Lindell§
Add to Reading List

Document Date: 2010-08-20 14:16:00


Open Document

File Size: 346,51 KB

Share Result on Facebook
UPDATE