Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
Home
Journals
Archaeology International
Architecture_MPS
Europe and the World: A law review
Film Education Journal
History Education Research Journal
International Journal of Development Education and Global Learning
International Journal of Social Pedagogy
Jewish Historical Studies: A Journal of English-Speaking Jewry
Journal of Bentham Studies
London Review of Education
Radical Americas
Research for All
The Journal of the Sylvia Townsend Warner Society
The London Journal of Canadian Studies
About
About UCL Press
Who we are
Contact us
My ScienceOpen
Sign in
Register
Dashboard
Search
202
views
14
references
Top references
cited by
15
Cite as...
0 reviews
Review
0
comments
Comment
0
recommends
+1
Recommend
0
collections
Add to
0
shares
Share
Twitter
Sina Weibo
Facebook
Email
2,173
similar
All similar
Record
: found
Abstract
: not found
Book Chapter
: not found
Applied Cryptography and Network Security
Efficient Robust Private Set Intersection
other
Author(s):
Dana Dachman-Soled
,
Tal Malkin
,
Mariana Raykova
,
Moti Yung
Publication date
(Print):
2009
Publisher:
Springer Berlin Heidelberg
Read this book at
Publisher
Buy book
Review
Review book
Invite someone to review
Bookmark
Cite as...
There is no author summary for this book yet. Authors can add summaries to their books on ScienceOpen to make them more accessible to a non-specialist audience.
Related collections
REPO-TRIAL
Most cited references
14
Record
: found
Abstract
: not found
Book Chapter
: not found
Public-Key Cryptosystems Based on Composite Degree Residuosity Classes
Pascal Paillier
(1999)
0
comments
Cited
367
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Conference Proceedings
: not found
How to generate and exchange secrets
Andrew Yao
(1986)
0
comments
Cited
307
times
– based on
0
reviews
Bookmark
Record
: found
Abstract
: not found
Book Chapter
: not found
Privacy Preserving Data Mining
Yehuda Lindell
,
Benny Pinkas
(2000)
0
comments
Cited
76
times
– based on
0
reviews
Bookmark
All references
Author and book information
Book Chapter
Publication date (Print):
2009
Pages
: 125-142
DOI:
10.1007/978-3-642-01957-9_8
SO-VID:
6567df32-e01c-49b9-aefa-5e3c2c94a0a0
License:
http://www.springer.com/tdm
History
Data availability:
Comments
Comment on this book
Sign in to comment
Book chapters
pp. 125
Efficient Robust Private Set Intersection
pp. 168
Dual-Policy Attribute Based Encryption
pp. 292
Homomorphic MACs: MAC-Based Integrity for Network Coding
pp. 499
Theoretical and Practical Aspects of Mutual Information Based Side Channel Analysis
Similar content
2,173
Reassessing the Public/Private Nature of European Court Cultures : An Introduction
Authors:
Dustin M. Neighbors
From a Parisian Dining Room to a German Private Museum: Frans Hals in the Collections of Count André Mniszech and Marcus Kappel
Authors:
Emilie den Tonkelaar
Comparison of uninsured and privately insured hospital patients. Condition on admission, resource use, and outcome
Authors:
J. Hadley
See all similar
Cited by
15
Efficient Set Intersection with Simulation-Based Security
Authors:
Michael Freedman
,
Carmit Hazay
,
Kobbi Nissim
…
Linear-Complexity Private Set Intersection Protocols Secure in Malicious Model
Authors:
Emiliano De Cristofaro
,
Jihye Kim
,
Gene Tsudik
Improved Private Set Intersection Against Malicious Adversaries
Authors:
Peter Rindal
,
Mike Rosulek
See all cited by