Incentive-driven attacker for corrupting two-party protocols

Yilei Wang*, Roberto Metere, Huiyu Zhou, Guanghai Cui, Tao Li

*Corresponding author for this work

Research output: Contribution to journalArticlepeer-review

1 Citation (Scopus)
39 Downloads (Pure)

Fingerprint

Dive into the research topics of 'Incentive-driven attacker for corrupting two-party protocols'. Together they form a unique fingerprint.

Computer Science