Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
42
views
14
references
Top references
cited by
15
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,449
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Applied Cryptography and Network Security
Efficient Robust Private Set Intersection
other
Author(s):
Dana Dachman-Soled
,
Tal Malkin
,
Mariana Raykova
,
Moti Yung
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
REPO-TRIAL
Most cited references
14
Record
: found
Abstract
: not found
Book Chapter
: not found
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Pascal Paillier
(1999)
0
comments
Cited
366
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
How to generate and exchange secrets
Andrew Yao
(1986)
0
comments
Cited
307
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Privacy Preserving Data Mining
Yehuda Lindell
,
Benny Pinkas
(2000)
0
comments
Cited
76
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 125-142
DOI:
10.1007/978-3-642-01957-9_8
SO-VID:
6567df32-e01c-49b9-aefa-5e3c2c94a0a0
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 125
Efficient Robust Private Set Intersection
pp. 168
Dual-Policy Attribute Based Encryption
pp. 292
Homomorphic MACs: MAC-Based Integrity for Network Coding
pp. 499
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis
Similar content
2,449
A robust and efficient algorithm for the shape description of protein structures and its application in predicting ligand binding sites
Authors:
Lei Xie
,
Philip E. Bourne
Overweight and obesity and associated factors among public and private secondary school adolescent students in Harar city, Eastern Ethiopia: A comparative cross-sectional study
Authors:
Miheret Mandefro
,
Hirbo Shore
,
Saba Hailu
…
Multi-intersection Traffic Light Control Using Infinitesimal Perturbation Analysis
Authors:
Yanfeng Geng
,
Christos Cassandras
See all similar
Cited by
15
Efficient Set Intersection with Simulation-Based Security
Authors:
Michael Freedman
,
Carmit Hazay
,
Kobbi Nissim
…
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Authors:
Emiliano De Cristofaro
,
Jihye Kim
,
Gene Tsudik
Improved Private Set Intersection Against Malicious Adversaries
Authors:
Peter Rindal
,
Mike Rosulek
See all cited by