Yonatan Aumann, Yehuda Lindell. Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. In Salil P. Vadhan, editor, Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings. Volume 4392 of Lecture Notes in Computer Science, pages 137-156, Springer, 2007. [doi]
@inproceedings{AumannL07, title = {Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries}, author = {Yonatan Aumann and Yehuda Lindell}, year = {2007}, doi = {10.1007/978-3-540-70936-7_8}, url = {http://dx.doi.org/10.1007/978-3-540-70936-7_8}, tags = {protocol, security}, researchr = {https://researchr.org/publication/AumannL07}, cites = {0}, citedby = {0}, pages = {137-156}, booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings}, editor = {Salil P. Vadhan}, volume = {4392}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {3-540-70935-5}, }