Return to Article Details Privacy in advanced cryptographic protocols: Prototypical examples Download Download PDF