First page
Back
Continue
Last page
Overview
Graphics
Questions:
do
Are known protocols UC-secure?
(Do these protocols “emulate” the trusted services associated with the corresponding tasks?)
How to design UC-secure protocols?zcyk02]
Notes: