Incentive-driven attacker for corrupting two-party protocols (Q1626274): Difference between revisions

From MaRDI portal
RedirectionBot (talk | contribs)
Changed an Item
Normalize DOI.
 
(4 intermediate revisions by 4 users not shown)
Property / DOI
 
Property / DOI: 10.1007/s00500-018-3342-3 / rank
Normal rank
 
Property / MaRDI profile type
 
Property / MaRDI profile type: MaRDI publication profile / rank
 
Normal rank
Property / full work available at URL
 
Property / full work available at URL: https://doi.org/10.1007/s00500-018-3342-3 / rank
 
Normal rank
Property / OpenAlex ID
 
Property / OpenAlex ID: W2809435741 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Modeling Bitcoin Contracts by Timed Automata / rank
 
Normal rank
Property / cites work
 
Property / cites work: Towards a Game Theoretic View of Secure Computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: How to Use Bitcoin to Design Fair Protocols / rank
 
Normal rank
Property / cites work
 
Property / cites work: Verifiable Computation over Large Database with Incremental Updates / rank
 
Normal rank
Property / cites work
 
Property / cites work: Revisiting Cryptographic Accumulators, Additional Properties and Relations to Other Primitives / rank
 
Normal rank
Property / cites work
 
Property / cites work: Privacy-preserving naive Bayes classifiers secure against the substitution-then-comparison attack / rank
 
Normal rank
Property / cites work
 
Property / cites work: Foundations of Cryptography / rank
 
Normal rank
Property / cites work
 
Property / cites work: Partial fairness in secure two-party computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3549726 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Fair Computation with Rational Players / rank
 
Normal rank
Property / cites work
 
Property / cites work: Rational secret sharing and multiparty computation / rank
 
Normal rank
Property / cites work
 
Property / cites work: Q3549592 / rank
 
Normal rank
Property / cites work
 
Property / cites work: Secure deduplication storage systems supporting keyword search / rank
 
Normal rank
Property / cites work
 
Property / cites work: Differentially private naive Bayes learning over multiple data sources / rank
 
Normal rank
Property / cites work
 
Property / cites work: An Optimally Fair Coin Toss / rank
 
Normal rank
Property / cites work
 
Property / cites work: Public audit for operation behavior logs with error locating in cloud storage / rank
 
Normal rank
Property / Wikidata QID
 
Property / Wikidata QID: Q129621324 / rank
 
Normal rank
Property / DOI
 
Property / DOI: 10.1007/S00500-018-3342-3 / rank
 
Normal rank

Latest revision as of 23:32, 10 December 2024

scientific article
Language Label Description Also known as
English
Incentive-driven attacker for corrupting two-party protocols
scientific article

    Statements

    Incentive-driven attacker for corrupting two-party protocols (English)
    0 references
    0 references
    0 references
    0 references
    0 references
    0 references
    27 November 2018
    0 references
    cost corruption
    0 references
    incentive-driven adversary
    0 references
    two-party computation
    0 references

    Identifiers