Incentive-driven attacker for corrupting two-party protocols

Summary

This is a publication. If there is no link to the publication on this page, you can try the pre-formated search via the search engines listed on this page.

Authors: Yilei Wang, Roberto Metere, Huiyu Zhou, Guanghai Cui, Tao Li

Journal title: Soft Computing

Journal number: 22/23

Journal publisher: Springer Verlag

Published year: 2018

Published pages: 7733-7740

DOI identifier: 10.1007/s00500-018-3342-3

ISSN: 1432-7643