Much of the literature on rational cryptography focuses on analyzing the strategic properties of cryptographic protocols. However, due to the presence of computationally-bounded players and the ...
Some results have been hidden because they may be inaccessible to you
Show inaccessible results