Magnifying computing gaps

In the field of information security, the best way of protecting the privacy of the participants is to keep silent. Consider two, not necessarily identical, powerful computers or computer-grids connected by a unidirectional communication link that should transfer a long stream of information in the...

Full description

Saved in:
Bibliographic Details
Published in:Theoretical computer science Vol. 636; pp. 17 - 26
Main Authors: Dolev, Shlomi, Korach, Ephraim, Li, Ximing, Li, Yin, Uzan, Galit
Format: Journal Article
Language:English
Published: Elsevier B.V 11.07.2016
Subjects:
ISSN:0304-3975, 1879-2294
Online Access:Get full text
Tags: Add Tag
No Tags, Be the first to tag this record!
Be the first to leave a comment!
You must be logged in first