(Q4414)
Jump to navigation
Jump to search
Statements
2 April 2020
0 references
In-depth formal analysis of the protocol is necessary before deployment and should be published. Protecting privacy should rely on mathematical proofs of correctness. Our questions focus on privacy aspects, but ensuring security is similarly crucial.
0 references