57
views
0
recommends
+1 Recommend
0 collections
    0
    shares
      • Record: found
      • Abstract: not found
      • Book Chapter: not found
      Applied Cryptography and Network Security 

      Efficient Robust Private Set Intersection

      other

      Read this book at

      Buy book Bookmark
          There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.

          Related collections

          Most cited references14

          • Record: found
          • Abstract: not found
          • Book Chapter: not found

          Public-Key Cryptosystems Based on Composite Degree Residuosity Classes

            Bookmark
            • Record: found
            • Abstract: not found
            • Conference Proceedings: not found

            How to generate and exchange secrets

            Andrew Yao (1986)
              Bookmark
              • Record: found
              • Abstract: not found
              • Book Chapter: not found

              Privacy Preserving Data Mining

                Bookmark

                Author and book information

                Book Chapter
                2009
                : 125-142
                10.1007/978-3-642-01957-9_8
                6567df32-e01c-49b9-aefa-5e3c2c94a0a0

                http://www.springer.com/tdm

                History

                Comments

                Comment on this book