Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
53
views
14
references
Top references
cited by
15
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
3,618
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Applied Cryptography and Network Security
Efficient Robust Private Set Intersection
other
Author(s):
Dana Dachman-Soled
,
Tal Malkin
,
Mariana Raykova
,
Moti Yung
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
REPO-TRIAL
Most cited references
14
Record
: found
Abstract
: not found
Book Chapter
: not found
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Pascal Paillier
(1999)
0
comments
Cited
366
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
How to generate and exchange secrets
Andrew Yao
(1986)
0
comments
Cited
307
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Privacy Preserving Data Mining
Yehuda Lindell
,
Benny Pinkas
(2000)
0
comments
Cited
76
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 125-142
DOI:
10.1007/978-3-642-01957-9_8
SO-VID:
6567df32-e01c-49b9-aefa-5e3c2c94a0a0
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 125
Efficient Robust Private Set Intersection
pp. 168
Dual-Policy Attribute Based Encryption
pp. 292
Homomorphic MACs: MAC-Based Integrity for Network Coding
pp. 499
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis
Similar content
3,618
Physicians in private practice: reasons for being a social franchise member
Authors:
Dale Huntington
,
Gary Mundy
,
Nang Mo Hom
…
“Self-testing sounds more private, rather than going to the clinic and everybody will find out”: Facilitators and barriers regarding HIV testing among men who purchase sex in Bali, Indonesia
Authors:
Luh Putu Lila Wulandari
,
Abby Ruddick
,
Rebecca F. Guy
…
Prevalence and antimicrobial resistance patterns of microbes isolated from individuals attending private diagnostic centre in Cape Coast Metropolis of Ghana
Authors:
Alberta Anning
,
Emmanuel Baah
,
Suzzana Dickson Buabeng
…
See all similar
Cited by
15
Efficient Set Intersection with Simulation-Based Security
Authors:
Michael Freedman
,
Carmit Hazay
,
Kobbi Nissim
…
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Authors:
Emiliano De Cristofaro
,
Jihye Kim
,
Gene Tsudik
Improved Private Set Intersection Against Malicious Adversaries
Authors:
Peter Rindal
,
Mike Rosulek
See all cited by