Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries

Yonatan Aumann, Yehuda Lindell. Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries. In Salil P. Vadhan, editor, Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings. Volume 4392 of Lecture Notes in Computer Science, pages 137-156, Springer, 2007. [doi]

@inproceedings{AumannL07,
  title = {Security Against Covert Adversaries: Efficient Protocols for Realistic Adversaries},
  author = {Yonatan Aumann and Yehuda Lindell},
  year = {2007},
  doi = {10.1007/978-3-540-70936-7_8},
  url = {http://dx.doi.org/10.1007/978-3-540-70936-7_8},
  tags = {protocol, security},
  researchr = {https://researchr.org/publication/AumannL07},
  cites = {0},
  citedby = {0},
  pages = {137-156},
  booktitle = {Theory of Cryptography, 4th Theory of Cryptography Conference, TCC 2007, Amsterdam, The Netherlands, February 21-24, 2007, Proceedings},
  editor = {Salil P. Vadhan},
  volume = {4392},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {3-540-70935-5},
}