This paper concerns the possibility of developing a coherent
theory of security when feasibility is associated 
with expected probabilistic polynomial-time (expected PPT).
The source of difficulty is that 
the known definitions of expected PPT strategies
(i.e., expected PPT interactive machines) 
do not support natural results of the ...
                	
            		    more >>>